Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
17 Cards in this Set
- Front
- Back
Monitors network traffic and sends malicious traffic into the network.
|
Drive-By Hackers
|
|
Someone who travels around looking for unprotected wireless access points.
|
War Drivers
|
|
An unauthorized access point
|
Rogue Access Points
|
|
A weak security mechanism for 802.11
|
Wired Equivalent Privacy (WEP)
|
|
The 802.11 security method created as a stopgap between WEP and 802.11
|
Wireless Protected Access (WPA)
|
|
Today’s preferred standard. Extremely strong
|
802.11i (WPA2)
|
|
A protocol that authenticates users with authentication data and authentication servers.
|
Extensible Authentication Protocol (EAP)
|
|
A mode of operation in WPA and 802.11 in which all stations and an access point share the same initial key.
|
Pre-Shared Key
|
|
A standard that provides protection between the wireless access point and the wireless host.
|
Core Security Standard
|
|
Attacker access point out-side a building that attacks clients inside the building to associate with it.
|
Evil twin access points
|
|
A network that uses the Internet or a wireless network with added security for data transmission.
|
Virtual Private Networks (VPNs)
|
|
What is the most popular standard for extended 802.1x security?
|
Protected Extensible Authentication Protocol (PEAP)
|
|
An unauthorized access point
|
Rouge access point
|
|
An access point that can be managed remotely.
|
Smart access points
|
|
The type of attack whose goal is to make a computer or a network unavailable to its users.
|
Denial of service
|
|
An Ethernet switch to which to multiple access points connect and also manages the access points.
|
Wireless LAN switch
|
|
Spread spectrum transmission system that has extremely wide channels.
|
Ultrawideband (UWB)
|