WN Quiz

1234567
Across
  1. 3. attack takes place when an attacker sets up a fake Wi-Fi access point hoping that users will connect to it instead of a legitimate one
  2. 5. Cryptographic tool.
  3. 7. layer of bluetooths networking stack used by the bluesmack attacker
Down
  1. 1. Attack in which false information is produced by an attacker.
  2. 2. bluetooth device hijacks another with spam advertising.
  3. 4. software component used to assess the security robustness of the ZigBee protocol/network (pen testing tool)
  4. 5. physical attacks like jamming the system with noise interference, blocking radio signals etc.
  5. 6. attack where a fake tag tries to interact with a genuine reader and fool the reader into thinking it is a real card.