Matching
Match each term with the correct statement below.
Premises:
an imposter AP that is set up by an attacker
granting or denying approval to use specific resources
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
an attack that makes it appear that the wireless device and the network computers are communicating with each other
cryptographic keys that create a repeating pattern
the output from a pseudo-random number generator (PRNG)
an attack that attempts to prevent a device from performing its normal functions
data input into an encryption algorithm
the process of changing ciphertext into plaintext
data that has been encrypted
Responses:
RF jamming
weak keys
keystream
man-in-the-middle
plaintext
evil twin
access control
denial of service
ciphertext
decryption
Correct Answer:
Premises:
Responses:
an imposter AP that is set up by an attacker
granting or denying approval to use specific resources
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
an attack that makes it appear that the wireless device and the network computers are communicating with each other
cryptographic keys that create a repeating pattern
the output from a pseudo-random number generator (PRNG)
an attack that attempts to prevent a device from performing its normal functions
data input into an encryption algorithm
the process of changing ciphertext into plaintext
data that has been encrypted
Premises:
an imposter AP that is set up by an attacker
granting or denying approval to use specific resources
a DoS attack that floods the RF spectrum with extraneous RF signal "noise" that prevents communications from occurring
an attack that makes it appear that the wireless device and the network computers are communicating with each other
cryptographic keys that create a repeating pattern
the output from a pseudo-random number generator (PRNG)
an attack that attempts to prevent a device from performing its normal functions
data input into an encryption algorithm
the process of changing ciphertext into plaintext
data that has been encrypted
Responses:
Related Questions
Q30: Describe war driving.
Q31: An attacker spoofs frames to prevent a
Q32: _ ensures that the information is correct
Q33: List and describe the three characteristics of
Q34: Open system authentication and shared key authentication
Q35: What is a distributed attack?
Q36: A WLAN can contain many entry points,making
Q37: What three categories can the protections implemented
Q38: Searching for unprotected wireless networks is called
Q40: The process whereby an attacker can trick