Match each item with an statement below:
A. standard network management protocol for wired networks.
B. designed to stop an attack from occurring.
C. most basic method for identifying and locating a rogue access point.
D. device that can monitor the airwaves for traffic.
E. designed to exclusively monitor the RF frequency for transmissions.
F. gives limited privacy protections against the sale of private financial information and obtaining personal information through false pretenses.
G. false attack alerts.
H. attempts to uncover and prevent an attack before it harms the WLAN.
I. simplest wireless device discovery method.
A. SNMP
B. Intrusion prevention system
C. Mobile sniffing audit
D. Wireless probe
E. Dedicated probe
F. Gramm-Leach-Bliley Act (GLBA)
G. False positives
H. Wireless intrusion prevention system (WIPS)
I. Nearest sensor
You might also like to view...
How can you initialize an array of two characters to 'a' and 'b'?
a. char[] charArray = new char[2]; charArray = {'a', 'b'}; b. char[2] charArray = {'a', 'b'}; c. char[] charArray = {'a', 'b'}; d. char[] charArray = new char[]{'a', 'b'};
Stacked alignment in a table changes the text orientation from horizontal to vertical for each individual character
Indicate whether the statement is true or false
Beginning with Windows 2003 Server, there are client operating systems included with the distribution.
Answer the following statement true (T) or false (F)
Mergesort uses the divide-and-conquer technique to sort a list.
Answer the following statement true (T) or false (F)