Match each item with a statement below.
A. A more sophisticated device used in an office setting instead of a wireless router
B. An attack that sends unsolicited messages to Bluetooth-enabled devices
C. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
D. An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device
E. Removing the built-in limitations and protections on Google Android devices
F. Downloading an app from an unofficial third-party website
G. A new class of mobile technology consisting of devices that can be worn by the user instead of carried
H. A security setting that provides the optimum level of wireless security
I. The technical name for a Wi-Fi network
A. access point
B. bluejacking
C. bluesnarfing
D. evil twin
E. rooting
F. sideloading
G. wearable technology
H. WPA2 Personal
I. WLAN
You might also like to view...
A game program uses the ____ loop to control the display of the menu, which must appear on the screen at least once.
A. prettest B. posttest C. DoAfter D. ProcessAfter
When a collision is detected in Ethernet, it is resolved using
a. stop-and-wait ARQ b. go-back-N ARQ c. priority backoff d. random backoff
A ________ is a note, annotation, or additional information for the author or another reader about the content of a document
A) comment B) source C) citation D) markup
The ________ function will replace one string with another
Fill in the blank(s) with correct word