Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Chapter 5 Terms Quiz

Select the Answer that corresponds to the displayed Question.
incorrect
1. near field communication (NFC)




incorrect
2. IV attack




incorrect
3. Wi-Fi




incorrect
4. bluejacking




incorrect
5. evil twin




incorrect
6. Wired Equivalent Privacy (WEP)




incorrect
7. replay attack




incorrect
8. radio frequency identification (RFID)




incorrect
9. SSID




Select the Question that corresponds to the displayed Answer.
incorrect
10. The byproduct of electrical processes. One common form of interference is Radio Frequency Interference (RFI), which is usually projected across a radio spectrum.




incorrect
11. Purposely obstructing or interfering with a signal.




incorrect
12. An authentication process that requires the user to do something in order to complete the enrollment process. Examples include pressing a button on the router within a short time period, entering a PIN, or bringing the new device close.




incorrect
13. The point at which access to a network is accomplished. This term is often used in relation to a wireless access point (WAP).




incorrect
14. The gaining of unauthorized access through a Bluetooth connection.




incorrect
15. The IEEE standard that defines port-based security for wireless network access control.




incorrect
16. The 802.11i standard. It is an enhancement to earlier standards, which were much weaker.




incorrect
17. A connection device used for clients in a radio frequency (RF) network.




incorrect
18. An unauthorized wireless access point on a network.




incorrect
19. An attack in which the intruder sends a frame to the AP with a spoofed address to make it look like it came from the victim and disconnects them from the network.





Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: StudySleeping
Popular Computers sets