Deck 12: Operational Support and Wireless Convergence

Full screen (f)
exit full mode
Question
The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.

A) last mile connection
B) fiber-optic mile
C) copper line
D) cable connection
Use Space or
up arrow
down arrow
to flip the card.
Question
WPA replaces WEP with an encryption technology called ____.

A) Secure Shell (SSH)
B) Temporal Key Integrity Protocol (TKIP)
C) Message Integrity Check (MIC)
D) Message Authentication Code (MAC)
Question
WiMAX is based on the IEEE ____ standard approved in June 2004.

A) 802.3
B) 802.16
C) 802.32
D) 802.56
Question
____, or controlling changes made to the WLAN after installation, is another key element of operational support.

A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
Question
WPA2 is based on the final IEEE 802.11F standard ratified in June 2004.
Question
In a wireless LAN access control is often performed by enterprise ____.

A) wireless gateways
B) wireless probes
C) router probes
D) AP gateways
Question
A(n) ____ is designed to stop an attack from occurring by uncovering and preventing an attack before it harms the WLAN.

A) WIDS
B) IDS
C) WLAN management system
D) WIPS
Question
Monitoring tools for wired networks always provide the full array of features necessary for monitoring WLANs.
Question
____ allows computers and network equipment to gather data about network performance.

A) FTP
B) SNMP
C) SFTP
D) L2TP
Question
All networks require effective operational support to ensure that everything functions as intended.
Question
A ____ constantly monitors the radio frequency for attacks.

A) WIDS
B) SNMP
C) WLAN management system
D) SFTP system
Question
A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.
Question
____ allows users to freely roam both indoors and outdoors for kilometers while remaining connected.

A) Fixed WiMAX
B) 3G
C) Mobile WiMAX
D) DSL WiMAX
Question
Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.

A) pedagogical
B) neurological
C) visual
D) kinesthetic
Question
All computer users share responsibility for protecting the assets of an organization.
Question
An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.

A) VPN
B) filtering
C) segmentation
D) firewalling
Question
In order for a change request form process to be able to thoroughly evaluate how a proposed change may impact the WLAN, it is first necessary to have established a(n) ____.

A) RF channel
B) coverage area
C) WLAN baseline
D) AP area
Question
At the heart of any secure WLAN is ____.

A) traffic filtering
B) protocol monitoring
C) education and training
D) strong encryption
Question
IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.

A) 802.11a
B) 802.11g
C) 802.11i
D) 802.11r
Question
A WLAN that has been designed from the outset to be secure and ____ (able to accommodate growth) will provide a solid foundation from which attacks can be thwarted and users can feel confident regarding the security of their work.

A) mobile
B) fast
C) scalable
D) global
Question
A baseline will typically include a(n) ____________________, or a listing of all installed wireless components,configuration settings,and diagrams that document the current state of the wireless LAN.
Question
The first generation of wireless cellular technology is known as ____.

A) 0G
B) 1G
C) 2.5G
D) 3G
Question
What elements can be identified using WLAN monitoring tools?
Question
Why is operational support important for a WLAN?
Question
A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.
Question
How can wireless segmentation be accomplished?
Question
How does WPA Enterprise and WPA2 Enterprise models port-based authentication work?
Question
Briefly describe traffic filtering.
Question
Briefly describe role-based access control.
Question
With throughput rates for ____ averaging between 400 Kbps and 700 Kbps, this means for the first time the cellular telephone network can be used for wireless data communications.

A) 1G
B) 2G
C) 2.5G
D) 3G
Question
The ____ is an interim step between 2G and 3G digital cellular networks.

A) 2.1G
B) 2i.G
C) 2.5G
D)2.Ig
Question
What are the types of changes that can be made to an WLAN?
Question
Known as ____________________, it is the mechanism for limiting access to resources based on the users' identity and their membership in various groups.
Question
Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.
Question
The first generation of wireless cellular telephony transmitted at 9.6 Kbps using analog ____ technology.

A) packet-switch
B) frame-switch
C) unit-switch
D) circuit-switch
Question
The current 802.16 standard, known as ____________________, is officially IEEE 802.16-2004.
Question
How does RADIUS work?
Question
The primary difference between 2G and 2.5G networks is that 2.5G networks are ____.

A) circuit-switched
B) packet-switched
C) channel-switched
D) path-switched
Question
The IEEE ____ standard would permit users to roam up to 15 kilometers and to deliver those high-speed rates to mobile users even when they are traveling at speeds up to 250 kilometers per hour (155 miles per hour).

A) 802.3
B) 802.16
C) 802.17i
D) 802.20
Question
Why is it important to train and educate all network users?
Question
What are the characteristics of 3G technology for data communications?
Question
Match between columns
specifies information that access points need to exchange to support WLAN roaming.
IEEE 802.11F
specifies information that access points need to exchange to support WLAN roaming.
Wired equivalent privacy (WEP)
specifies information that access points need to exchange to support WLAN roaming.
Mobile WiMAX
specifies information that access points need to exchange to support WLAN roaming.
Traffic filtering
specifies information that access points need to exchange to support WLAN roaming.
WLAN management system
specifies information that access points need to exchange to support WLAN roaming.
Wireless authentication
specifies information that access points need to exchange to support WLAN roaming.
SNMP
specifies information that access points need to exchange to support WLAN roaming.
Network segment
specifies information that access points need to exchange to support WLAN roaming.
2G cellular telephony
verifies that the person requesting access to the network is who they claim to be.
IEEE 802.11F
verifies that the person requesting access to the network is who they claim to be.
Wired equivalent privacy (WEP)
verifies that the person requesting access to the network is who they claim to be.
Mobile WiMAX
verifies that the person requesting access to the network is who they claim to be.
Traffic filtering
verifies that the person requesting access to the network is who they claim to be.
WLAN management system
verifies that the person requesting access to the network is who they claim to be.
Wireless authentication
verifies that the person requesting access to the network is who they claim to be.
SNMP
verifies that the person requesting access to the network is who they claim to be.
Network segment
verifies that the person requesting access to the network is who they claim to be.
2G cellular telephony
subset of a larger network.
IEEE 802.11F
subset of a larger network.
Wired equivalent privacy (WEP)
subset of a larger network.
Mobile WiMAX
subset of a larger network.
Traffic filtering
subset of a larger network.
WLAN management system
subset of a larger network.
Wireless authentication
subset of a larger network.
SNMP
subset of a larger network.
Network segment
subset of a larger network.
2G cellular telephony
adds mobility components to the Fixed WiMAX standard.
IEEE 802.11F
adds mobility components to the Fixed WiMAX standard.
Wired equivalent privacy (WEP)
adds mobility components to the Fixed WiMAX standard.
Mobile WiMAX
adds mobility components to the Fixed WiMAX standard.
Traffic filtering
adds mobility components to the Fixed WiMAX standard.
WLAN management system
adds mobility components to the Fixed WiMAX standard.
Wireless authentication
adds mobility components to the Fixed WiMAX standard.
SNMP
adds mobility components to the Fixed WiMAX standard.
Network segment
adds mobility components to the Fixed WiMAX standard.
2G cellular telephony
original IEEE 802.11 encryption mechanism.
IEEE 802.11F
original IEEE 802.11 encryption mechanism.
Wired equivalent privacy (WEP)
original IEEE 802.11 encryption mechanism.
Mobile WiMAX
original IEEE 802.11 encryption mechanism.
Traffic filtering
original IEEE 802.11 encryption mechanism.
WLAN management system
original IEEE 802.11 encryption mechanism.
Wireless authentication
original IEEE 802.11 encryption mechanism.
SNMP
original IEEE 802.11 encryption mechanism.
Network segment
original IEEE 802.11 encryption mechanism.
2G cellular telephony
used circuit-switched digital networks and started in the early 1990s.
IEEE 802.11F
used circuit-switched digital networks and started in the early 1990s.
Wired equivalent privacy (WEP)
used circuit-switched digital networks and started in the early 1990s.
Mobile WiMAX
used circuit-switched digital networks and started in the early 1990s.
Traffic filtering
used circuit-switched digital networks and started in the early 1990s.
WLAN management system
used circuit-switched digital networks and started in the early 1990s.
Wireless authentication
used circuit-switched digital networks and started in the early 1990s.
SNMP
used circuit-switched digital networks and started in the early 1990s.
Network segment
used circuit-switched digital networks and started in the early 1990s.
2G cellular telephony
standard network management protocol for both wired and wireless networks.
IEEE 802.11F
standard network management protocol for both wired and wireless networks.
Wired equivalent privacy (WEP)
standard network management protocol for both wired and wireless networks.
Mobile WiMAX
standard network management protocol for both wired and wireless networks.
Traffic filtering
standard network management protocol for both wired and wireless networks.
WLAN management system
standard network management protocol for both wired and wireless networks.
Wireless authentication
standard network management protocol for both wired and wireless networks.
SNMP
standard network management protocol for both wired and wireless networks.
Network segment
standard network management protocol for both wired and wireless networks.
2G cellular telephony
restricts the traffic on a network based on specific criteria.
IEEE 802.11F
restricts the traffic on a network based on specific criteria.
Wired equivalent privacy (WEP)
restricts the traffic on a network based on specific criteria.
Mobile WiMAX
restricts the traffic on a network based on specific criteria.
Traffic filtering
restricts the traffic on a network based on specific criteria.
WLAN management system
restricts the traffic on a network based on specific criteria.
Wireless authentication
restricts the traffic on a network based on specific criteria.
SNMP
restricts the traffic on a network based on specific criteria.
Network segment
restricts the traffic on a network based on specific criteria.
2G cellular telephony
uses discovery tools to continuously monitor the RF for attacks
IEEE 802.11F
uses discovery tools to continuously monitor the RF for attacks
Wired equivalent privacy (WEP)
uses discovery tools to continuously monitor the RF for attacks
Mobile WiMAX
uses discovery tools to continuously monitor the RF for attacks
Traffic filtering
uses discovery tools to continuously monitor the RF for attacks
WLAN management system
uses discovery tools to continuously monitor the RF for attacks
Wireless authentication
uses discovery tools to continuously monitor the RF for attacks
SNMP
uses discovery tools to continuously monitor the RF for attacks
Network segment
uses discovery tools to continuously monitor the RF for attacks
2G cellular telephony
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Operational Support and Wireless Convergence
1
The ____ refers to the connection that begins at a fast ISP, goes through the local neighborhood, and ends at the home or office.

A) last mile connection
B) fiber-optic mile
C) copper line
D) cable connection
A
2
WPA replaces WEP with an encryption technology called ____.

A) Secure Shell (SSH)
B) Temporal Key Integrity Protocol (TKIP)
C) Message Integrity Check (MIC)
D) Message Authentication Code (MAC)
B
3
WiMAX is based on the IEEE ____ standard approved in June 2004.

A) 802.3
B) 802.16
C) 802.32
D) 802.56
B
4
____, or controlling changes made to the WLAN after installation, is another key element of operational support.

A) Controlling and Evaluation
B) Configuration management
C) Monitoring
D) Education
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
WPA2 is based on the final IEEE 802.11F standard ratified in June 2004.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
In a wireless LAN access control is often performed by enterprise ____.

A) wireless gateways
B) wireless probes
C) router probes
D) AP gateways
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
A(n) ____ is designed to stop an attack from occurring by uncovering and preventing an attack before it harms the WLAN.

A) WIDS
B) IDS
C) WLAN management system
D) WIPS
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
Monitoring tools for wired networks always provide the full array of features necessary for monitoring WLANs.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
____ allows computers and network equipment to gather data about network performance.

A) FTP
B) SNMP
C) SFTP
D) L2TP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
All networks require effective operational support to ensure that everything functions as intended.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
A ____ constantly monitors the radio frequency for attacks.

A) WIDS
B) SNMP
C) WLAN management system
D) SFTP system
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
A secure WLAN should use WEP for its encryption, although WPA may be required in older legacy equipment.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
____ allows users to freely roam both indoors and outdoors for kilometers while remaining connected.

A) Fixed WiMAX
B) 3G
C) Mobile WiMAX
D) DSL WiMAX
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
Most people are taught using a(n) ____ approach, which comes from a Greek word meaning to lead a child.

A) pedagogical
B) neurological
C) visual
D) kinesthetic
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
All computer users share responsibility for protecting the assets of an organization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
An important principle of good wireless network security design is dividing the network into smaller units, a practice known as ____.

A) VPN
B) filtering
C) segmentation
D) firewalling
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
In order for a change request form process to be able to thoroughly evaluate how a proposed change may impact the WLAN, it is first necessary to have established a(n) ____.

A) RF channel
B) coverage area
C) WLAN baseline
D) AP area
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
At the heart of any secure WLAN is ____.

A) traffic filtering
B) protocol monitoring
C) education and training
D) strong encryption
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
IEEE ____ allows a wireless client to determine the quality of service (QoS) and security being used at a different AP before making the transition.

A) 802.11a
B) 802.11g
C) 802.11i
D) 802.11r
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
A WLAN that has been designed from the outset to be secure and ____ (able to accommodate growth) will provide a solid foundation from which attacks can be thwarted and users can feel confident regarding the security of their work.

A) mobile
B) fast
C) scalable
D) global
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
A baseline will typically include a(n) ____________________, or a listing of all installed wireless components,configuration settings,and diagrams that document the current state of the wireless LAN.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The first generation of wireless cellular technology is known as ____.

A) 0G
B) 1G
C) 2.5G
D) 3G
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
What elements can be identified using WLAN monitoring tools?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Why is operational support important for a WLAN?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
A(n) ____________________ outlines the requested alteration in such a way that it can be determine what type of review is needed prior to accepting (or rejecting) the proposed changes.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
How can wireless segmentation be accomplished?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
How does WPA Enterprise and WPA2 Enterprise models port-based authentication work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
Briefly describe traffic filtering.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
Briefly describe role-based access control.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
With throughput rates for ____ averaging between 400 Kbps and 700 Kbps, this means for the first time the cellular telephone network can be used for wireless data communications.

A) 1G
B) 2G
C) 2.5G
D) 3G
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The ____ is an interim step between 2G and 3G digital cellular networks.

A) 2.1G
B) 2i.G
C) 2.5G
D)2.Ig
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
What are the types of changes that can be made to an WLAN?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
Known as ____________________, it is the mechanism for limiting access to resources based on the users' identity and their membership in various groups.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
Encryption under theWPA2 personal security model is accomplished by using the block cipher ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
The first generation of wireless cellular telephony transmitted at 9.6 Kbps using analog ____ technology.

A) packet-switch
B) frame-switch
C) unit-switch
D) circuit-switch
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The current 802.16 standard, known as ____________________, is officially IEEE 802.16-2004.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
How does RADIUS work?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
The primary difference between 2G and 2.5G networks is that 2.5G networks are ____.

A) circuit-switched
B) packet-switched
C) channel-switched
D) path-switched
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
The IEEE ____ standard would permit users to roam up to 15 kilometers and to deliver those high-speed rates to mobile users even when they are traveling at speeds up to 250 kilometers per hour (155 miles per hour).

A) 802.3
B) 802.16
C) 802.17i
D) 802.20
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
Why is it important to train and educate all network users?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the characteristics of 3G technology for data communications?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
specifies information that access points need to exchange to support WLAN roaming.
IEEE 802.11F
specifies information that access points need to exchange to support WLAN roaming.
Wired equivalent privacy (WEP)
specifies information that access points need to exchange to support WLAN roaming.
Mobile WiMAX
specifies information that access points need to exchange to support WLAN roaming.
Traffic filtering
specifies information that access points need to exchange to support WLAN roaming.
WLAN management system
specifies information that access points need to exchange to support WLAN roaming.
Wireless authentication
specifies information that access points need to exchange to support WLAN roaming.
SNMP
specifies information that access points need to exchange to support WLAN roaming.
Network segment
specifies information that access points need to exchange to support WLAN roaming.
2G cellular telephony
verifies that the person requesting access to the network is who they claim to be.
IEEE 802.11F
verifies that the person requesting access to the network is who they claim to be.
Wired equivalent privacy (WEP)
verifies that the person requesting access to the network is who they claim to be.
Mobile WiMAX
verifies that the person requesting access to the network is who they claim to be.
Traffic filtering
verifies that the person requesting access to the network is who they claim to be.
WLAN management system
verifies that the person requesting access to the network is who they claim to be.
Wireless authentication
verifies that the person requesting access to the network is who they claim to be.
SNMP
verifies that the person requesting access to the network is who they claim to be.
Network segment
verifies that the person requesting access to the network is who they claim to be.
2G cellular telephony
subset of a larger network.
IEEE 802.11F
subset of a larger network.
Wired equivalent privacy (WEP)
subset of a larger network.
Mobile WiMAX
subset of a larger network.
Traffic filtering
subset of a larger network.
WLAN management system
subset of a larger network.
Wireless authentication
subset of a larger network.
SNMP
subset of a larger network.
Network segment
subset of a larger network.
2G cellular telephony
adds mobility components to the Fixed WiMAX standard.
IEEE 802.11F
adds mobility components to the Fixed WiMAX standard.
Wired equivalent privacy (WEP)
adds mobility components to the Fixed WiMAX standard.
Mobile WiMAX
adds mobility components to the Fixed WiMAX standard.
Traffic filtering
adds mobility components to the Fixed WiMAX standard.
WLAN management system
adds mobility components to the Fixed WiMAX standard.
Wireless authentication
adds mobility components to the Fixed WiMAX standard.
SNMP
adds mobility components to the Fixed WiMAX standard.
Network segment
adds mobility components to the Fixed WiMAX standard.
2G cellular telephony
original IEEE 802.11 encryption mechanism.
IEEE 802.11F
original IEEE 802.11 encryption mechanism.
Wired equivalent privacy (WEP)
original IEEE 802.11 encryption mechanism.
Mobile WiMAX
original IEEE 802.11 encryption mechanism.
Traffic filtering
original IEEE 802.11 encryption mechanism.
WLAN management system
original IEEE 802.11 encryption mechanism.
Wireless authentication
original IEEE 802.11 encryption mechanism.
SNMP
original IEEE 802.11 encryption mechanism.
Network segment
original IEEE 802.11 encryption mechanism.
2G cellular telephony
used circuit-switched digital networks and started in the early 1990s.
IEEE 802.11F
used circuit-switched digital networks and started in the early 1990s.
Wired equivalent privacy (WEP)
used circuit-switched digital networks and started in the early 1990s.
Mobile WiMAX
used circuit-switched digital networks and started in the early 1990s.
Traffic filtering
used circuit-switched digital networks and started in the early 1990s.
WLAN management system
used circuit-switched digital networks and started in the early 1990s.
Wireless authentication
used circuit-switched digital networks and started in the early 1990s.
SNMP
used circuit-switched digital networks and started in the early 1990s.
Network segment
used circuit-switched digital networks and started in the early 1990s.
2G cellular telephony
standard network management protocol for both wired and wireless networks.
IEEE 802.11F
standard network management protocol for both wired and wireless networks.
Wired equivalent privacy (WEP)
standard network management protocol for both wired and wireless networks.
Mobile WiMAX
standard network management protocol for both wired and wireless networks.
Traffic filtering
standard network management protocol for both wired and wireless networks.
WLAN management system
standard network management protocol for both wired and wireless networks.
Wireless authentication
standard network management protocol for both wired and wireless networks.
SNMP
standard network management protocol for both wired and wireless networks.
Network segment
standard network management protocol for both wired and wireless networks.
2G cellular telephony
restricts the traffic on a network based on specific criteria.
IEEE 802.11F
restricts the traffic on a network based on specific criteria.
Wired equivalent privacy (WEP)
restricts the traffic on a network based on specific criteria.
Mobile WiMAX
restricts the traffic on a network based on specific criteria.
Traffic filtering
restricts the traffic on a network based on specific criteria.
WLAN management system
restricts the traffic on a network based on specific criteria.
Wireless authentication
restricts the traffic on a network based on specific criteria.
SNMP
restricts the traffic on a network based on specific criteria.
Network segment
restricts the traffic on a network based on specific criteria.
2G cellular telephony
uses discovery tools to continuously monitor the RF for attacks
IEEE 802.11F
uses discovery tools to continuously monitor the RF for attacks
Wired equivalent privacy (WEP)
uses discovery tools to continuously monitor the RF for attacks
Mobile WiMAX
uses discovery tools to continuously monitor the RF for attacks
Traffic filtering
uses discovery tools to continuously monitor the RF for attacks
WLAN management system
uses discovery tools to continuously monitor the RF for attacks
Wireless authentication
uses discovery tools to continuously monitor the RF for attacks
SNMP
uses discovery tools to continuously monitor the RF for attacks
Network segment
uses discovery tools to continuously monitor the RF for attacks
2G cellular telephony
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.