Across
- 3. Authentication method that forces a user to agree to terms or pay a fee before accessing the wireless network.
- 4. IEEE designation for all wireless networking standards.
- 5. Was introduced in 2018 to address the vulnerabilities inherent in the previous revision.
- 6. Temporal Key Integrity Protocol
- 8. Advanced Encryption Standard
- 10. Wireless authentication method that allows for automatic connection between a device and the wireless access point.
- 12. Remote Authentication Dial-In Service
- 14. An enhancement that allows multiple antennas to use the same radio frequency.
- 15. Wireless authentication method that uses a passphrase to authenticate users.
- 16. A communication method that allows two-way communication between two devices within a few centimeters of each other.
- 17. A method that combines channels into one to increase bandwidth.
Down
- 1. It was introduced in 2004 and is still heavily used in today's networks.
- 2. Terminal Access Controller Access-Control System
- 5. Encryption protocol used on most wireless networks today. Versions 2 and 3 are the latest versions in use.
- 7. Was developed at MIT and is a key component of Windows Active Directory.
- 9. A communication method that uses radio waves to transmit data from small circuit boards called RFID tags to special scanners.
- 11. Service Set Identifier
- 13. Security flaw that can occur with a wireless network
