Match each item with an statement below:

A. standard network management protocol for wired networks.
B. designed to stop an attack from occurring.
C. most basic method for identifying and locating a rogue access point.
D. device that can monitor the airwaves for traffic.
E. designed to exclusively monitor the RF frequency for transmissions.
F. gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
G. false attack alerts.
H. attempts to uncover and prevent an attack before it harms the WLAN.
I. simplest wireless device discovery method.


A. SNMP
B. Intrusion prevention system
C. Mobile sniffing audit
D. Wireless probe
E. Dedicated probe
F. Gramm-Leach-Bliley Act (GLBA)
G. False positives
H. Wireless intrusion prevention system (WIPS)
I. Nearest sensor

Computer Science & Information Technology

You might also like to view...

How can you initialize an array of two characters to 'a' and 'b'?

a. char[] charArray = new char[2]; charArray = {'a', 'b'}; b. char[2] charArray = {'a', 'b'}; c. char[] charArray = {'a', 'b'}; d. char[] charArray = new char[]{'a', 'b'};

Computer Science & Information Technology

Stacked alignment in a table changes the text orientation from horizontal to vertical for each individual character

Indicate whether the statement is true or false

Computer Science & Information Technology

Beginning with Windows 2003 Server, there are client operating systems included with the distribution.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

Mergesort uses the divide-and-conquer technique to sort a list.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology