11.5

1234567891011121314151617181920
Across
  1. 4. The implementation name for wireless security that adheres to the 802.11i specifications.
  2. 7. This proves the users identity.
  3. 13. This combines two non-overlapping 20MHZ channels into a single 40MHz channel.
  4. 15. Many networks implement this.
  5. 17. This was developed at MIT and is a key component of Windows Active Directory.
  6. 19. This increases bandwidth by using multiple antennas for both the transmitter and receiver.
  7. 20. This logs what the user accessed while on the network.
Down
  1. 1. This defines what the user can access.
  2. 2. This is the standard for local networks created by IEEE-SA.
  3. 3. This has no authentication and allows anyone to connect to the network.
  4. 5. This was introduced in 2018 to address the vulnerabilities inherent in the WPA2 handshake and to support newer technologies.
  5. 6. This uses radio waves to transmit data from small circuit boards to special scanners.
  6. 8. This is a newer technology that is built on RFID.
  7. 9. This was developed by Cisco to address security concerns in RADIUS.
  8. 10. This is based on the Rijndael algorithm.
  9. 11. This was used with WPA and WPA2 wireless security standards.
  10. 12. This is and enhancement to MIMO that allows users to use the same channel.
  11. 14. This is designed to allow devices to communicate withing a personal area network of close proximity.
  12. 16. This is most commonly used access method.
  13. 18. This is an open standard protocol used to authenticate users onto a network.