Chapter 10 Security Plus

1234567891011121314151617
Across
  1. 2. tool that provides a visual representation of the wireless signal
  2. 4. uses digital certificates for authentication
  3. 6. An in-depth examination and analysis of a WLAN site
  4. 7. usage in contactless payments
  5. 9. An EAP method designed to simplify the deployment of 802.1x
  6. 12. web page that is displayed to users when they attempt to access a public network
  7. 15. accesses unauthorized information from a Bluetooth connection
  8. 17. A wireless attack in which false deauthentication
Down
  1. 1. securely tunnels any credential form for authentication using TLS
  2. 3. sends unsolicited messages to Bluetooth-enabled devices
  3. 5. The encryption protocol used for WPA2
  4. 8. standards used to transmit information from tags to a proximity reader
  5. 10. A framework for transporting authentication protocols
  6. 11. A wireless technology that uses short-range radio frequency
  7. 13. An unauthorized AP that allows an attacker to bypass many of the network security
  8. 14. Intentionally flooding the radio frequency spectrum
  9. 16. An AP set up by an attacker to mimic an authorized AP