Match each term with the correct statement below.

A. data input into an encryption algorithm
B. an attack that makes it appear that the wireless device and the network computers are communicating with each other
C. an attack that attempts to prevent a device from performing its
normal functions
D. cryptographic keys that create a repeating pattern
E. the process of changing ciphertext into plaintext
F. a DoS attack that floods the RF spectrum with extraneous RF signal "noise"
that prevents communications from occurring
G. an imposter AP that is set up by an attacker
H. data that has been encrypted
I. the output from a pseudo-random number generator (PRNG)
J. granting or denying approval to use specific resources


A. plaintext
B. man-in-the-middle
C. denial of service
D. weak keys
E. decryption
F. RF jamming
G. evil twin
H. ciphertext
I. keystream
J. access control

Computer Science & Information Technology

You might also like to view...

The World Wide Web is a subset of the Internet that exchanges pages written in HTML

Indicate whether the statement is true or false

Computer Science & Information Technology

A base class’s _______ members are accessible within that base class and anywhere that the program has a handle to an object of that class or one of its derived classes.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology

Which of the following is NOT a way for Windows 8 to automatically arrange open windows on the desktop?

A) Show windows stacked B) Cascade windows C) Show windows side by side D) Show windows tiled

Computer Science & Information Technology

A(n) ________ is a collection of styles that are designed to work together

Fill in the blank(s) with correct word

Computer Science & Information Technology