Search Header Logo
Chapter 9 Vocabulary CST Network Pro

Chapter 9 Vocabulary CST Network Pro

Assessment

Presentation

Other

Professional Development

Easy

Created by

Marina Brzostoski

Used 1+ times

FREE Resource

13 Slides • 12 Questions

1

​Service set identifier (SSID)

Specify= Identify

A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.

Some text here about the topic of discussion

2

Multiple Select

A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.

1

Service set identifier

2

(SSID)

3

 Ad Hoc

4

 Data emanation

3

Encryption: secret code

En=in Crypto=hidden

Encryption that implements a key-mixing feature that only the receiver can unlock.

key-mixing feature

Temporal Key Integrity Protocol (TKIP)

Some text here about the topic of discussion

media

4

Multiple Select

Temporal Key Integrity Protocol

1

integrates a KEY-mixing feature

2

encryption

3

encryption that implements a key-mixing feature that only the receiver can unlock.

5

RAd Hoc

A wireless Network

A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.

Some text here about the topic of discussion

6

Fill in the Blank

Rad Hoc is a wireless network that works in peer- to- ____ mode without an access point. The wireless NICs in each host communicate directly with one another.

7

 Wi-Fi Protected Access (WPA)

A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.

media

8

Multiple Select

 Wi-Fi Protected Access (WPA)

1

security certification program

2

developed by the Wi-Fi Alliance

9

​Crypto=hidden( Greek)

Words in English with crypto:

​encrypt, decrypt, encryption

https://www.thefreedictionary.com/words-containing-crypt

media

10

Advanced Encryption Standard

​encryption, encrypt, decrypt

Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission

11

Fill in the Blank

Encryption that uses 128-, 192-, or 256-bit key lengths to _____ and _______ block-sized messages over a wireless transmission

12

media

13

Shared key authentication

Authentication

An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.

14

Reorder

Question image

Put these definition pieces in order: Shared key authentication is ..

authentication method that configures clients and access points

with a shared key (called a secret or a passphrase).

Only devices with the correct shared key

can connect to

the wireless network.

1
2
3
4
5

15

media

originally this word had nothing to do with snooping.

Eavesdrop started off literally: first it referred to the water that fell from the eaves of a house, then it came to mean the ground where that water fell.

Eventually, the eavesdropper described someone who stood within the eavesdrop of a house to overhear a conversation inside.

Eves of the house

​Eavesdrop Origins:

16

 Data emanation

eavesdropping-listen secretly

The electromagnetic field generated by a network cable or network device (such as a wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.

media

17

Multiple Choice

Data Emanation

1

Encryption that implements a key-mixing feature that only the receiver can unlock.

2

The electromagnetic field generated by a network cable or network device (such as a wireless router) can be manipulated in order to eavesdrop on conversations or steal data.

18

media

An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use this to stage evil twin or on-path attacks.

 Deauthentication attack

19

Multiple Select

Question image

Deauthentication attack

1

An attack that spoofs the MAC address and then disconnects the device from the wireless network.

2

Attackers can use this to stage evil twin or on-path attacks.

20

​Absorption

media

A signal passes through objects and the signal loses power.

​Absorb-take in

21

Fill in the Blank

A signal passes through objects and the signal _____ power.

22

media

Radio waves pass through objects of different densities, causing the signal to bend or change speeds.

Some text here about the topic of discussion.

Refraction

refract (v.)

"to bend or break the natural course of" (light, sound, heat, etc.), 1610s, back-formation from refraction, and in part from Latin refractus

www.etymonline.com

23

Multiple Choice

Radio waves pass through objects of different densities, causing the signal to bend or change speeds:

1

​Refraction

2

Absorption

24

Match

Match the following

A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.

A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.

Encryption that implements a key-mixing feature that only the receiver can unlock.

Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission

 Ad Hoc

 Wi-Fi Protected Access (WPA)

Temporal Key Integrity Protocol (TKIP)

 Advanced Encryption Standard

25

Match

Match the following

An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.

The electromagnetic field generated by a network cable or network device (such as a wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.

An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use this to stage evil twin or on-path attacks.

A signal passes through objects and the signal loses power.

Radio waves pass through objects of different densities, causing the signal to bend or change speeds.

Shared key authentication

 Data emanation

Deauthentication attack

 Absorption

Refraction

​Service set identifier (SSID)

Specify= Identify

A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.

Some text here about the topic of discussion

Show answer

Auto Play

Slide 1 / 25

SLIDE