Match each item with an statement below:
A. the "network name" for the wireless network.
B. stream cipher that accepts keys up to 128 bits in length.
C. an encryption algorithm.
D. tool to perform WEP attacks.
E. can limit a user's access to the Internet.
F. looking over someone's shoulder.
G. adds two new security enhancements to WEP.
H. method of determining the keystream by analyzing two packets that were created from the same IV.
I. method of restricting access to resources.
A. SSID
B. RC4
C. Cipher
D. AirSnort
E. Access restrictions
F. Shoulder surfing
G. WEP2
H. Keystream attack
I. Access control
You might also like to view...
The list container provided by the Standard Template Library is a template version of a
a. singly linked list b. doubly linked list c. circular linked list d. backward linked list e. None of these
Which type of memory is a volatile form of memory that holds the operating system, programs, and data the computer is currently using?
a.Cache b.CMOS c.RAM d.ROM
The Send to Back command moves a selected object underneath all stacked objects._________________________
Answer the following statement true (T) or false (F)
Remote Desktop and Remote Assistance are two names for the same feature
Indicate whether the statement is true or false