Chapter 10 Security Plus
Across
- 2. tool that provides a visual representation of the wireless signal
- 4. uses digital certificates for authentication
- 6. An in-depth examination and analysis of a WLAN site
- 7. usage in contactless payments
- 9. An EAP method designed to simplify the deployment of 802.1x
- 12. web page that is displayed to users when they attempt to access a public network
- 15. accesses unauthorized information from a Bluetooth connection
- 17. A wireless attack in which false deauthentication
Down
- 1. securely tunnels any credential form for authentication using TLS
- 3. sends unsolicited messages to Bluetooth-enabled devices
- 5. The encryption protocol used for WPA2
- 8. standards used to transmit information from tags to a proximity reader
- 10. A framework for transporting authentication protocols
- 11. A wireless technology that uses short-range radio frequency
- 13. An unauthorized AP that allows an attacker to bypass many of the network security
- 14. Intentionally flooding the radio frequency spectrum
- 16. An AP set up by an attacker to mimic an authorized AP