Deck 1: Foundations of Wireless Security

Full screen (f)
exit full mode
Question
IEEE ____ standards set specifications for Ethernet local area network technology.

A) 802.3
B) 802.5
C) 802.11
D) 802.20
Use Space or
up arrow
down arrow
to flip the card.
Question
Individuals who actively search for wireless signals to pick up, often by simply driving down the street, are participating in an activity known as ____.

A) AP war
B) wireless war
C) access driving
D) wardriving
Question
____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.

A) Wireless packet sniffer
B) VoWLAN
C) VoIP
D) Malware
Question
Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.

A) 802.11n
B) WiMAX
C) VoWLAN
D) 802.11i
Question
A ____ network can determine the optimum route for a packet to travel across the WLAN based on the quality required.

A) flat
B) mesh
C) single
D) linked
Question
A ____ site provides office space but the customer must provide and install all the equipment needed to continue operations.

A) cold
B) hot
C) warm
D) red
Question
The primary advantage of wireless technology is ____.

A) easier and less expensive installation
B) mobility
C) security
D) disaster recovery
Question
The FDA serves as the primary regulatory agency for wireless communications in the United States and its territorial possessions.
Question
Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.

A) mobility
B) network reliability
C) installation costs
D) security
Question
____ is software (or sometimes hardware) that allows to view the contents of wireless packets.

A) Spyware
B) Malware
C) Wireless packet sniffer
D) Adware
Question
Educational institutions were some of the first adopters of WLANs because of their dramatic advantages in teaching and learning.
Question
In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.

A) WLAN
B) Wi-Fi
C) Project 802
D) WiMAX
Question
The ____ establishes standards for telecommunications.

A) FDA
B) IEEE
C) PDA
D) VoIP
Question
An employee who purchases a wireless access point and brings it into the office to provide personal wireless access has installed a ____.

A) wardriving point
B) rogue access point
C) VoWLAN handset
D) VoIP handset
Question
In October 2002, the WECA organization changed its name to ____.

A) Wi-Fi (Wireless Fidelity) Alliance
B) WiMAX
C) VoWLAN
D) Project 802
Question
Typically all rogue access points have security features implemented.
Question
Wireless LAN applications can be found in every industry whose employees need or want to conduct business without being confined to a specific location.
Question
In the United States, the organization that controls and regulates wireless transmissions for use by citizens (as opposed to the federal government) is the ____.

A) IEEE
B) Wi-Fi Alliance
C) FCC
D) FDA
Question
Security attacks are isolated against organizations.
Question
____ protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures.

A) Information security
B) VoWLAN
C) FCC
D) FDA
Question
____________________ uses the existing data WLAN to make and receive telephone calls.
Question
The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.
Question
A(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
Question
Briefly explain how wireless technology increases network reliability.
Question
What are the benefits to businesses provided by wireless LANs?
Question
How does radio frequency interference affect wireless networks?
Question
Briefly describe the main characteristics of the IEEE.
Question
What are some of the characteristics of information that must be protected by information security?
Question
For computer networking and wireless communications the most widely known and influential organization is the ____________________.
Question
The ____ is the entire range of all radio frequencies.

A) unregulated bands
B) license-exempt spectrum
C) infrared light
D) radio frequency spectrum
Question
The ____ band is intended for devices that provide short-range, high-speed wireless digital communications.

A) CDMA
B) ISM
C) UNII
D) GSM
Question
The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.

A) 802.1
B) 802.3
C) 802.8
D) 802.11
Question
A(n) ____________________ site has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
Question
How does the speed of attacks factor make security increasingly difficult?
Question
The IEEE ____ standard specifies a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the UNII band.

A) 802.11
B) 802.11a
C) 802.11b
D) 802.11z
Question
The 802.11g standard, which is backward-compatible with 802.11b, specifies that devices operate entirely in the ____ frequency.

A) UNII
B) GSM
C) CDMA
D) ISM
Question
The radio frequency spectrum is divided into over 450 different sections or ____.

A) bands
B) amplitudes
C) wavelengths
D) heights
Question
Briefly explain how wireless technology benefits the health care industry.
Question
Briefly describe WECA main goals.
Question
What are the six certifications within CWNP?
Question
What are the main characteristics of the IEEE 802.11b standard?
Question
Match between columns
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Firewalls
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Security
standards for how WLANs connect to external networks such as the Internet or cellular networks.
The FCC
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE 802.11n
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE 802.11u
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Unregulated bands
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Distributed attacks
standards for how WLANs connect to external networks such as the Internet or cellular networks.
AreTec
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Firewalls
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Security
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
The FCC
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE 802.11n
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE 802.11u
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Unregulated bands
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Distributed attacks
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
AreTec
factor that makes security increasingly difficult.
Firewalls
factor that makes security increasingly difficult.
Security
factor that makes security increasingly difficult.
The FCC
factor that makes security increasingly difficult.
IEEE 802.11n
factor that makes security increasingly difficult.
IEEE 802.11u
factor that makes security increasingly difficult.
IEEE
factor that makes security increasingly difficult.
Unregulated bands
factor that makes security increasingly difficult.
Distributed attacks
factor that makes security increasingly difficult.
AreTec
restrict specific types of malware from entering a network.
Firewalls
restrict specific types of malware from entering a network.
Security
restrict specific types of malware from entering a network.
The FCC
restrict specific types of malware from entering a network.
IEEE 802.11n
restrict specific types of malware from entering a network.
IEEE 802.11u
restrict specific types of malware from entering a network.
IEEE
restrict specific types of malware from entering a network.
Unregulated bands
restrict specific types of malware from entering a network.
Distributed attacks
restrict specific types of malware from entering a network.
AreTec
an independent government agency that is directly responsible to Congress.
Firewalls
an independent government agency that is directly responsible to Congress.
Security
an independent government agency that is directly responsible to Congress.
The FCC
an independent government agency that is directly responsible to Congress.
IEEE 802.11n
an independent government agency that is directly responsible to Congress.
IEEE 802.11u
an independent government agency that is directly responsible to Congress.
IEEE
an independent government agency that is directly responsible to Congress.
Unregulated bands
an independent government agency that is directly responsible to Congress.
Distributed attacks
an independent government agency that is directly responsible to Congress.
AreTec
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Firewalls
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Security
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
The FCC
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE 802.11n
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE 802.11u
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Unregulated bands
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Distributed attacks
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
AreTec
organization that promotes standardization in wireless technologies.
Firewalls
organization that promotes standardization in wireless technologies.
Security
organization that promotes standardization in wireless technologies.
The FCC
organization that promotes standardization in wireless technologies.
IEEE 802.11n
organization that promotes standardization in wireless technologies.
IEEE 802.11u
organization that promotes standardization in wireless technologies.
IEEE
organization that promotes standardization in wireless technologies.
Unregulated bands
organization that promotes standardization in wireless technologies.
Distributed attacks
organization that promotes standardization in wireless technologies.
AreTec
greatest disadvantage to wireless LANs.
Firewalls
greatest disadvantage to wireless LANs.
Security
greatest disadvantage to wireless LANs.
The FCC
greatest disadvantage to wireless LANs.
IEEE 802.11n
greatest disadvantage to wireless LANs.
IEEE 802.11u
greatest disadvantage to wireless LANs.
IEEE
greatest disadvantage to wireless LANs.
Unregulated bands
greatest disadvantage to wireless LANs.
Distributed attacks
greatest disadvantage to wireless LANs.
AreTec
the world's largest technical professional society with members around the globe.
Firewalls
the world's largest technical professional society with members around the globe.
Security
the world's largest technical professional society with members around the globe.
The FCC
the world's largest technical professional society with members around the globe.
IEEE 802.11n
the world's largest technical professional society with members around the globe.
IEEE 802.11u
the world's largest technical professional society with members around the globe.
IEEE
the world's largest technical professional society with members around the globe.
Unregulated bands
the world's largest technical professional society with members around the globe.
Distributed attacks
the world's largest technical professional society with members around the globe.
AreTec
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Foundations of Wireless Security
1
IEEE ____ standards set specifications for Ethernet local area network technology.

A) 802.3
B) 802.5
C) 802.11
D) 802.20
A
2
Individuals who actively search for wireless signals to pick up, often by simply driving down the street, are participating in an activity known as ____.

A) AP war
B) wireless war
C) access driving
D) wardriving
D
3
____ is a general term used to describe worms, viruses, spyware, or other types of software with a malicious intent.

A) Wireless packet sniffer
B) VoWLAN
C) VoIP
D) Malware
D
4
Just as a WLAN gives users mobility for accessing data, ____ provides that same freedom for voice communication.

A) 802.11n
B) WiMAX
C) VoWLAN
D) 802.11i
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
A ____ network can determine the optimum route for a packet to travel across the WLAN based on the quality required.

A) flat
B) mesh
C) single
D) linked
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
A ____ site provides office space but the customer must provide and install all the equipment needed to continue operations.

A) cold
B) hot
C) warm
D) red
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
The primary advantage of wireless technology is ____.

A) easier and less expensive installation
B) mobility
C) security
D) disaster recovery
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
The FDA serves as the primary regulatory agency for wireless communications in the United States and its territorial possessions.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
Along with the many advantages of WLAN technology there are disadvantages and concerns. These include radio frequency interference, health risks, and ____.

A) mobility
B) network reliability
C) installation costs
D) security
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
____ is software (or sometimes hardware) that allows to view the contents of wireless packets.

A) Spyware
B) Malware
C) Wireless packet sniffer
D) Adware
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
Educational institutions were some of the first adopters of WLANs because of their dramatic advantages in teaching and learning.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
In the early 1980s, the IEEE began work on developing computer network architecture standards. Its work was called ____.

A) WLAN
B) Wi-Fi
C) Project 802
D) WiMAX
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
The ____ establishes standards for telecommunications.

A) FDA
B) IEEE
C) PDA
D) VoIP
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
An employee who purchases a wireless access point and brings it into the office to provide personal wireless access has installed a ____.

A) wardriving point
B) rogue access point
C) VoWLAN handset
D) VoIP handset
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
In October 2002, the WECA organization changed its name to ____.

A) Wi-Fi (Wireless Fidelity) Alliance
B) WiMAX
C) VoWLAN
D) Project 802
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
Typically all rogue access points have security features implemented.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Wireless LAN applications can be found in every industry whose employees need or want to conduct business without being confined to a specific location.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
In the United States, the organization that controls and regulates wireless transmissions for use by citizens (as opposed to the federal government) is the ____.

A) IEEE
B) Wi-Fi Alliance
C) FCC
D) FDA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
Security attacks are isolated against organizations.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
____ protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through products, people, and procedures.

A) Information security
B) VoWLAN
C) FCC
D) FDA
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
____________________ uses the existing data WLAN to make and receive telephone calls.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
The term ____________________ is frequently used to describe the tasks of guarding information that is in a digital format.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
A(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
Briefly explain how wireless technology increases network reliability.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
What are the benefits to businesses provided by wireless LANs?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
How does radio frequency interference affect wireless networks?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
Briefly describe the main characteristics of the IEEE.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
What are some of the characteristics of information that must be protected by information security?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
For computer networking and wireless communications the most widely known and influential organization is the ____________________.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
The ____ is the entire range of all radio frequencies.

A) unregulated bands
B) license-exempt spectrum
C) infrared light
D) radio frequency spectrum
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
The ____ band is intended for devices that provide short-range, high-speed wireless digital communications.

A) CDMA
B) ISM
C) UNII
D) GSM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
The IEEE ____ standard specified that wireless transmissions could take place in one of two ways. The first is through infrared light, and the other type of transmission is by sending radio signals.

A) 802.1
B) 802.3
C) 802.8
D) 802.11
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
A(n) ____________________ site has all the equipment needed for an organization to continue running, including office space and furniture, telephone jacks, computer equipment, and a live telecommunications link.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
How does the speed of attacks factor make security increasingly difficult?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
The IEEE ____ standard specifies a maximum rated speed of 54 Mbps and also supports 48, 36, 24, 18, 12, 9, and 6 Mbps transmissions using the UNII band.

A) 802.11
B) 802.11a
C) 802.11b
D) 802.11z
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
The 802.11g standard, which is backward-compatible with 802.11b, specifies that devices operate entirely in the ____ frequency.

A) UNII
B) GSM
C) CDMA
D) ISM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
The radio frequency spectrum is divided into over 450 different sections or ____.

A) bands
B) amplitudes
C) wavelengths
D) heights
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
Briefly explain how wireless technology benefits the health care industry.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
Briefly describe WECA main goals.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
What are the six certifications within CWNP?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
What are the main characteristics of the IEEE 802.11b standard?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Firewalls
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Security
standards for how WLANs connect to external networks such as the Internet or cellular networks.
The FCC
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE 802.11n
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE 802.11u
standards for how WLANs connect to external networks such as the Internet or cellular networks.
IEEE
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Unregulated bands
standards for how WLANs connect to external networks such as the Internet or cellular networks.
Distributed attacks
standards for how WLANs connect to external networks such as the Internet or cellular networks.
AreTec
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Firewalls
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Security
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
The FCC
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE 802.11n
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE 802.11u
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
IEEE
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Unregulated bands
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
Distributed attacks
also known as Multiple-Input, Multiple-Output Enhanced WLAN (MEW).
AreTec
factor that makes security increasingly difficult.
Firewalls
factor that makes security increasingly difficult.
Security
factor that makes security increasingly difficult.
The FCC
factor that makes security increasingly difficult.
IEEE 802.11n
factor that makes security increasingly difficult.
IEEE 802.11u
factor that makes security increasingly difficult.
IEEE
factor that makes security increasingly difficult.
Unregulated bands
factor that makes security increasingly difficult.
Distributed attacks
factor that makes security increasingly difficult.
AreTec
restrict specific types of malware from entering a network.
Firewalls
restrict specific types of malware from entering a network.
Security
restrict specific types of malware from entering a network.
The FCC
restrict specific types of malware from entering a network.
IEEE 802.11n
restrict specific types of malware from entering a network.
IEEE 802.11u
restrict specific types of malware from entering a network.
IEEE
restrict specific types of malware from entering a network.
Unregulated bands
restrict specific types of malware from entering a network.
Distributed attacks
restrict specific types of malware from entering a network.
AreTec
an independent government agency that is directly responsible to Congress.
Firewalls
an independent government agency that is directly responsible to Congress.
Security
an independent government agency that is directly responsible to Congress.
The FCC
an independent government agency that is directly responsible to Congress.
IEEE 802.11n
an independent government agency that is directly responsible to Congress.
IEEE 802.11u
an independent government agency that is directly responsible to Congress.
IEEE
an independent government agency that is directly responsible to Congress.
Unregulated bands
an independent government agency that is directly responsible to Congress.
Distributed attacks
an independent government agency that is directly responsible to Congress.
AreTec
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Firewalls
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Security
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
The FCC
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE 802.11n
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE 802.11u
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
IEEE
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Unregulated bands
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
Distributed attacks
bands of the radio spectrum that are available nationwide to all users, without requiring a license.
AreTec
organization that promotes standardization in wireless technologies.
Firewalls
organization that promotes standardization in wireless technologies.
Security
organization that promotes standardization in wireless technologies.
The FCC
organization that promotes standardization in wireless technologies.
IEEE 802.11n
organization that promotes standardization in wireless technologies.
IEEE 802.11u
organization that promotes standardization in wireless technologies.
IEEE
organization that promotes standardization in wireless technologies.
Unregulated bands
organization that promotes standardization in wireless technologies.
Distributed attacks
organization that promotes standardization in wireless technologies.
AreTec
greatest disadvantage to wireless LANs.
Firewalls
greatest disadvantage to wireless LANs.
Security
greatest disadvantage to wireless LANs.
The FCC
greatest disadvantage to wireless LANs.
IEEE 802.11n
greatest disadvantage to wireless LANs.
IEEE 802.11u
greatest disadvantage to wireless LANs.
IEEE
greatest disadvantage to wireless LANs.
Unregulated bands
greatest disadvantage to wireless LANs.
Distributed attacks
greatest disadvantage to wireless LANs.
AreTec
the world's largest technical professional society with members around the globe.
Firewalls
the world's largest technical professional society with members around the globe.
Security
the world's largest technical professional society with members around the globe.
The FCC
the world's largest technical professional society with members around the globe.
IEEE 802.11n
the world's largest technical professional society with members around the globe.
IEEE 802.11u
the world's largest technical professional society with members around the globe.
IEEE
the world's largest technical professional society with members around the globe.
Unregulated bands
the world's largest technical professional society with members around the globe.
Distributed attacks
the world's largest technical professional society with members around the globe.
AreTec
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.