Matching
Match each term with the correct statement below.
Premises:
a device in an IEEE 802.1X network that accepts or rejects a supplicant
an encryption cipher that takes one character and replaces it with another character
providing access based on a user's job function within an organization
dynamically generating a new key for each packet to preventing collisions
a method for auditing usage by using an algorithm to determine if a threat exists
device in an IEEE 802.1X network that makes an appeal for access
using wireless technologies for asset tracking of wireless equipment
an encrypted alternative to the Telnet protocol that is used to access remote computers
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
Responses:
supplicant
real-time location services
secure shell
802.1X
Role-Based Access Control
per-packet key
stream cipher
wireless intrusion detection system
heuristic monitoring
authenticator
Correct Answer:
Premises:
Responses:
a device in an IEEE 802.1X network that accepts or rejects a supplicant
an encryption cipher that takes one character and replaces it with another character
providing access based on a user's job function within an organization
dynamically generating a new key for each packet to preventing collisions
a method for auditing usage by using an algorithm to determine if a threat exists
device in an IEEE 802.1X network that makes an appeal for access
using wireless technologies for asset tracking of wireless equipment
an encrypted alternative to the Telnet protocol that is used to access remote computers
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
Premises:
a device in an IEEE 802.1X network that accepts or rejects a supplicant
an encryption cipher that takes one character and replaces it with another character
providing access based on a user's job function within an organization
dynamically generating a new key for each packet to preventing collisions
a method for auditing usage by using an algorithm to determine if a threat exists
device in an IEEE 802.1X network that makes an appeal for access
using wireless technologies for asset tracking of wireless equipment
an encrypted alternative to the Telnet protocol that is used to access remote computers
a standard originally developed for wired networks that blocks all traffic on a port-by-port basis until the client is authenticated
a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
Responses:
Related Questions
Q14: What authentication system did the proposed WEP2
Q15: Describe a block cipher.
Q16: Briefly describe RADIUS and mention a strength
Q17: Which WEP weaknesses were identified by universities
Q18: Describe a dictionary attack.
Q20: What does WPA include that is designed
Q21: What was a design goal of WPA?<br>A)
Q22: Kerberos became the heart of the WPA
Q23: Which of the following is true about
Q24: _ WEP solves the weak IV problem