Across
- 3. A framework for transporting authentication protocols
- 5. uses digital certificates for authentication
- 6. Unauthorized users could listen in on communications between RFID tags and readers
- 9. The encryption protocol used for WPA2
- 11. accesses unauthorized information from a Bluetooth connection
- 12. An in-depth examination and analysis of a WLAN site
- 14. securely tunnels any credential form for authentication using TLS
- 16. A wireless attack in which false deauthentication
- 20. can be used to detect a rogue AP
- 24. standards used to transmit information from tags to a proximity reader
- 25. not recommended as a security protection for SSID
- 27. tool that provides a visual representation of the wireless signal
Down
- 1. web page that is displayed to users when they attempt to access a public network
- 2. sends unsolicited messages to Bluetooth-enabled devices
- 4. commonly called Wi-Fi
- 7. usage in contactless payments
- 8. A wireless technology that uses short-range radio frequency
- 10. An EAP method designed to simplify the deployment of 802.1x
- 13. Intentionally flooding the radio frequency spectrum
- 15. 200 milliwatts (mW)
- 17. minimum amount of wireless signal should extend beyond the walls of the building
- 18. An AP set up by an attacker to mimic an authorized AP
- 19. can mitigate against man-in-the-middle (MITM) attacks and is an optional WPA3 enhancement
- 21. A unique name identifying a Wi-Fi network
- 22. IEEE 802.1x standard
- 23. no longer support WEP
- 26. An unauthorized AP that allows an attacker to bypass many of the network security
