Match each item with an statement below:

A. the "network name" for the wireless network.
B. stream cipher that accepts keys up to 128 bits in length.
C. an encryption algorithm.
D. tool to perform WEP attacks.
E. can limit a user's access to the Internet.
F. looking over someone's shoulder.
G. adds two new security enhancements to WEP.
H. method of determining the keystream by analyzing two packets that were created from the same IV.
I. method of restricting access to resources.


A. SSID
B. RC4
C. Cipher
D. AirSnort
E. Access restrictions
F. Shoulder surfing
G. WEP2
H. Keystream attack
I. Access control

Computer Science & Information Technology

You might also like to view...

What does the instanceof operator do?

What will be an ideal response?

Computer Science & Information Technology

Write single C++ statements or portions of statements that do the following:

a) Input integer variable x with cin and >>. b) Input integer variable y with cin and >>. c) Set integer variable i to 1. d) Set integer variable power to 1. e) Multiply variable power by x and assign the result to power. f) Preincrement variable i by 1. g) Determine whether i is less than or equal to y. h) Output integer variable power with cout and <<.

Computer Science & Information Technology

Which of the following is connected inline to each end device and adds power to the line?

A. midspan device B. power sourcing equipment C. SoftAP D. EEG

Computer Science & Information Technology

An arguments is a value that provides information to the action

Indicate whether the statement is true or false

Computer Science & Information Technology