Chapter 10 Security Plus

123456789101112131415161718192021222324252627
Across
  1. 3. A framework for transporting authentication protocols
  2. 5. uses digital certificates for authentication
  3. 6. Unauthorized users could listen in on communications between RFID tags and readers
  4. 9. The encryption protocol used for WPA2
  5. 11. accesses unauthorized information from a Bluetooth connection
  6. 12. An in-depth examination and analysis of a WLAN site
  7. 14. securely tunnels any credential form for authentication using TLS
  8. 16. A wireless attack in which false deauthentication
  9. 20. can be used to detect a rogue AP
  10. 24. standards used to transmit information from tags to a proximity reader
  11. 25. not recommended as a security protection for SSID
  12. 27. tool that provides a visual representation of the wireless signal
Down
  1. 1. web page that is displayed to users when they attempt to access a public network
  2. 2. sends unsolicited messages to Bluetooth-enabled devices
  3. 4. commonly called Wi-Fi
  4. 7. usage in contactless payments
  5. 8. A wireless technology that uses short-range radio frequency
  6. 10. An EAP method designed to simplify the deployment of 802.1x
  7. 13. Intentionally flooding the radio frequency spectrum
  8. 15. 200 milliwatts (mW)
  9. 17. minimum amount of wireless signal should extend beyond the walls of the building
  10. 18. An AP set up by an attacker to mimic an authorized AP
  11. 19. can mitigate against man-in-the-middle (MITM) attacks and is an optional WPA3 enhancement
  12. 21. A unique name identifying a Wi-Fi network
  13. 22. IEEE 802.1x standard
  14. 23. no longer support WEP
  15. 26. An unauthorized AP that allows an attacker to bypass many of the network security