Matching
Match each term with the correct statement below.
Premises:
attacker floods the radio frequency spectrum with noise
person who has been hired to break into a computer and steal information
series of 1's and 0's equal in length to the text plus the ICV
key value that is used to encrypt wireless data transmissions when they are sent
person who violates system security with malicious intent
encryption algorithm
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
limit a user's admission to the access point
unskilled or novice users who break into computer systems with malicious intent
Responses:
cipher
jam
script kiddies
computer spy
cracker
hacker
keystream
filter
default key
Correct Answer:
Premises:
Responses:
attacker floods the radio frequency spectrum with noise
person who has been hired to break into a computer and steal information
series of 1's and 0's equal in length to the text plus the ICV
key value that is used to encrypt wireless data transmissions when they are sent
person who violates system security with malicious intent
encryption algorithm
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
limit a user's admission to the access point
unskilled or novice users who break into computer systems with malicious intent
Premises:
attacker floods the radio frequency spectrum with noise
person who has been hired to break into a computer and steal information
series of 1's and 0's equal in length to the text plus the ICV
key value that is used to encrypt wireless data transmissions when they are sent
person who violates system security with malicious intent
encryption algorithm
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
limit a user's admission to the access point
unskilled or novice users who break into computer systems with malicious intent
Responses:
Related Questions
Q27: Wireless DoS attacks are exactly the same
Q28: Describe at least four weaknesses of open
Q29: In a 64-bit packet sent using WEP,
Q30: When the recipient receives the encrypted text,
Q31: _ is another name for open systems
Q33: MAC address filtering is vulnerable because there
Q34: While most attacks take advantage of vulnerabilities
Q35: Describe a man-in-the-middle attack.
Q36: In a(n) _ attack, an attacker attempts
Q37: A wireless DoS attack may involve an