Match each term with the correct statement below.
A. data input into an encryption algorithm
B. an attack that makes it appear that the wireless device and the network computers are communicating with each other
C. an attack that attempts to prevent a device from performing its
normal functions
D. cryptographic keys that create a repeating pattern
E. the process of changing ciphertext into plaintext
F. a DoS attack that floods the RF spectrum with extraneous RF signal "noise"
that prevents communications from occurring
G. an imposter AP that is set up by an attacker
H. data that has been encrypted
I. the output from a pseudo-random number generator (PRNG)
J. granting or denying approval to use specific resources
A. plaintext
B. man-in-the-middle
C. denial of service
D. weak keys
E. decryption
F. RF jamming
G. evil twin
H. ciphertext
I. keystream
J. access control
You might also like to view...
The World Wide Web is a subset of the Internet that exchanges pages written in HTML
Indicate whether the statement is true or false
A base class’s _______ members are accessible within that base class and anywhere that the program has a handle to an object of that class or one of its derived classes.
Fill in the blank(s) with the appropriate word(s).
Which of the following is NOT a way for Windows 8 to automatically arrange open windows on the desktop?
A) Show windows stacked B) Cascade windows C) Show windows side by side D) Show windows tiled
A(n) ________ is a collection of styles that are designed to work together
Fill in the blank(s) with correct word