Matching
Match each item with an statement below:
Premises:
most basic method for identifying and locating a rogue access point.
simplest wireless device discovery method.
device that can monitor the airwaves for traffic.
attempts to uncover and prevent an attack before it harms the WLAN.
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
standard network management protocol for wired networks.
designed to exclusively monitor the RF frequency for transmissions.
designed to stop an attack from occurring.
false attack alerts.
Responses:
Intrusion prevention system
Wireless intrusion prevention system (WIPS)
Gramm-Leach-Bliley Act (GLBA)
Nearest sensor
SNMP
False positives
Dedicated probe
Mobile sniffing audit
Wireless probe
Correct Answer:
Premises:
Responses:
most basic method for identifying and locating a rogue access point.
simplest wireless device discovery method.
device that can monitor the airwaves for traffic.
attempts to uncover and prevent an attack before it harms the WLAN.
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
standard network management protocol for wired networks.
designed to exclusively monitor the RF frequency for transmissions.
designed to stop an attack from occurring.
false attack alerts.
Premises:
most basic method for identifying and locating a rogue access point.
simplest wireless device discovery method.
device that can monitor the airwaves for traffic.
attempts to uncover and prevent an attack before it harms the WLAN.
gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
standard network management protocol for wired networks.
designed to exclusively monitor the RF frequency for transmissions.
designed to stop an attack from occurring.
false attack alerts.
Responses:
Related Questions
Q11: _ uses intelligent algorithms to improve precision
Q12: The _ is a signal that tells
Q13: How does the nearest sensor method work?
Q14: What is the key to wireless probes?
Q15: A spike in a network's bandwidth or
Q17: What are the advantages and disadvantages of
Q18: A(n) _ system monitors the normal activity
Q19: In a WIDS anomaly detection system the
Q20: What are the steps to perform a
Q21: Monitoring the RF frequency requires a special