Match each item with an statement below:

A. allows a device to become authenticated to an AP before moving into range of the AP.
B. intended for settings in which an authentication server is unavailable.
C. encryption protocol in the 802.11i standard.
D. allows a company to maintain user profiles in a central database that all remote servers can share.
E. subset of 802.11i that addresses both encryption and authentication.
F. designed for medium to large-sized organizations such as businesses, government agencies, and universities.
G. "leases" IP addresses to clients to use while they are connected to the network.
H. second generation of WPA security.
I. manipulates an entire block of text at one time.


A. Pre-authentication
B. Personal security model
C. AES-CCMP
D. RADIUS
E. WPA
F. Enterprise security model
G. DHCP
H. WPA2
I. Block cipher

Computer Science & Information Technology

You might also like to view...

You cannot convert a GUI application into an applet.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

In addition to displaying subtotals, the Subtotal feature "____" your worksheet so you can control the level of detail that is displayed.

A. headers B. outlines C. shadows D. defines

Computer Science & Information Technology

The exchange of information among DNS servers regarding configured zones is known as:

A. resource request B. zone sharing C. zone transfer D. zone removal

Computer Science & Information Technology

Two files are created for each page when you build Web applications. This file ending in .aspx holds the HTML tags.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology