11.5
Across
- 4. The implementation name for wireless security that adheres to the 802.11i specifications.
- 7. This proves the users identity.
- 13. This combines two non-overlapping 20MHZ channels into a single 40MHz channel.
- 15. Many networks implement this.
- 17. This was developed at MIT and is a key component of Windows Active Directory.
- 19. This increases bandwidth by using multiple antennas for both the transmitter and receiver.
- 20. This logs what the user accessed while on the network.
Down
- 1. This defines what the user can access.
- 2. This is the standard for local networks created by IEEE-SA.
- 3. This has no authentication and allows anyone to connect to the network.
- 5. This was introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies.
- 6. This uses radio waves to transmit data from small circuit boards to special scanners.
- 8. This is a newer technology that is built on RFID.
- 9. This was developed by Cisco to address security concerns in RADIUS.
- 10. This is based on the Rijndael algorithm.
- 11. This was used with WPA and WPA2 wireless security standards.
- 12. This is and enhancement to MIMO that allows users to use the same channel.
- 14. This is designed to allow devices to communicate withing a personal area network of close proximity.
- 16. This is most commonly used access method.
- 18. This is an open standard protocol used to authenticate users onto a network.