Match each item with a statement below.

A. A more sophisticated device used in an office setting instead of a wireless router
B. An attack that sends unsolicited messages to Bluetooth-enabled devices
C. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
D. An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device
E. Removing the built-in limitations and protections on Google Android devices
F. Downloading an app from an unofficial third-party website
G. A new class of mobile technology consisting of devices that can be worn by the user instead of carried
H. A security setting that provides the optimum level of wireless security
I. The technical name for a Wi-Fi network


A. access point
B. bluejacking
C. bluesnarfing
D. evil twin
E. rooting
F. sideloading
G. wearable technology
H. WPA2 Personal
I. WLAN

Computer Science & Information Technology

You might also like to view...

A game program uses the ____ loop to control the display of the menu, which must appear on the screen at least once.

A. prettest B. posttest C. DoAfter D. ProcessAfter

Computer Science & Information Technology

When a collision is detected in Ethernet, it is resolved using

a. stop-and-wait ARQ b. go-back-N ARQ c. priority backoff d. random backoff

Computer Science & Information Technology

A ________ is a note, annotation, or additional information for the author or another reader about the content of a document

A) comment B) source C) citation D) markup

Computer Science & Information Technology

The ________ function will replace one string with another

Fill in the blank(s) with correct word

Computer Science & Information Technology