CEH Chapter 16 Crossword Puzzle
Across
- 1. Tool for ARP poisoning
- 4. Data transfer rate capacity
- 6. WPA2 key reinstallation attack
- 7. Detects WPS enabled access points
- 9. Latest WiFi security protocol
- 10. Wireless security using AES
- 15. Fake access point impersonator
- 16. Hops across multiple frequencies
- 18. Process connecting client to AP
- 22. Portable radio spectrum analyzer
- 26. Public place with WiFi access
- 28. EAP inside secure TLS tunnel
- 31. Unauthorized wireless access point
- 32. Captures wireless packets and handshakes
- 33. Wireless sniffer and detector
- 35. Disrupts wireless communication signals
- 36. Improved wireless security standard
- 38. Spread spectrum using code sequence
Down
- 2. WPA per packet keying
- 3. Marking symbols for WiFi spots
- 5. Fakes hardware network address
- 7. Legacy wireless encryption protocol
- 8. Centralized authentication server system
- 11. Walking to find wireless networks
- 12. Cracks WPS PIN codes
- 13. Access point MAC identifier
- 14. Wireless network name identifier
- 17. Driving to discover wireless networks
- 18. Connects wireless clients to network
- 19. Dragonfly password authentication method
- 20. WPA2 encryption integrity protocol
- 21. Protocol analyzer for packet capture
- 23. Rogue access point lure
- 24. Cracks WEP and WPA keys
- 25. Drone based wireless discovery
- 27. Multi carrier digital modulation method
- 29. Enables wireless monitor mode
- 30. Injects frames into wireless traffic
- 34. Multiple antenna OFDM transmission method
- 37. Strong symmetric encryption algorithm