
Chapter 9 Vocabulary CST Network Pro
Presentation
•
Other
•
Professional Development
•
Easy
Marina Brzostoski
Used 1+ times
FREE Resource
13 Slides • 12 Questions
1
Service set identifier (SSID)
Specify= Identify
A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.
Some text here about the topic of discussion
2
Multiple Select
A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.
Service set identifier
(SSID)
Ad Hoc
Data emanation
3
Encryption: secret code
En=in Crypto=hidden
Encryption that implements a key-mixing feature that only the receiver can unlock.
key-mixing feature
Temporal Key Integrity Protocol (TKIP)
Some text here about the topic of discussion
4
Multiple Select
Temporal Key Integrity Protocol
integrates a KEY-mixing feature
encryption
encryption that implements a key-mixing feature that only the receiver can unlock.
5
RAd Hoc
A wireless Network
A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.
Some text here about the topic of discussion
6
Fill in the Blanks
Type answer...
7
Wi-Fi Protected Access (WPA)
A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.
8
Multiple Select
Wi-Fi Protected Access (WPA)
security certification program
developed by the Wi-Fi Alliance
9
Crypto=hidden( Greek)
Words in English with crypto:
encrypt, decrypt, encryption
10
Advanced Encryption Standard
encryption, encrypt, decrypt
Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission
11
Fill in the Blanks
Type answer...
12
13
Shared key authentication
Authentication
An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
14
Reorder
Put these definition pieces in order: Shared key authentication is ..
authentication method that configures clients and access points
with a shared key (called a secret or a passphrase).
Only devices with the correct shared key
can connect to
the wireless network.
15
originally this word had nothing to do with snooping.
Eavesdrop started off literally: first it referred to the water that fell from the eaves of a house, then it came to mean the ground where that water fell.
Eventually, the eavesdropper described someone who stood within the eavesdrop of a house to overhear a conversation inside.
Eves of the house
Eavesdrop Origins:
16
Data emanation
eavesdropping-listen secretly
The electromagnetic field generated by a network cable or network device (such as a wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.
17
Multiple Choice
Data Emanation
Encryption that implements a key-mixing feature that only the receiver can unlock.
The electromagnetic field generated by a network cable or network device (such as a wireless router) can be manipulated in order to eavesdrop on conversations or steal data.
18
An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use this to stage evil twin or on-path attacks.
Deauthentication attack
19
Multiple Select
Deauthentication attack
An attack that spoofs the MAC address and then disconnects the device from the wireless network.
Attackers can use this to stage evil twin or on-path attacks.
20
Absorption
A signal passes through objects and the signal loses power.
Absorb-take in
21
Fill in the Blanks
Type answer...
22
Radio waves pass through objects of different densities, causing the signal to bend or change speeds.
Some text here about the topic of discussion.
Refraction
refract (v.)
"to bend or break the natural course of" (light, sound, heat, etc.), 1610s, back-formation from refraction, and in part from Latin refractus
23
Multiple Choice
Radio waves pass through objects of different densities, causing the signal to bend or change speeds:
Refraction
Absorption
24
Match
A wireless network that works in peer-to-peer mode without an access point. The wireless NICs in each host communicate directly with one another.
A security certification program that was developed by the Wi-Fi Alliance to secure wireless signals between devices.
Encryption that implements a key-mixing feature that only the receiver can unlock.
Encryption that uses 128-, 192-, or 256-bit key lengths to encrypt and decrypt block-sized messages over a wireless transmission
Ad Hoc
Wi-Fi Protected Access (WPA)
Temporal Key Integrity Protocol (TKIP)
Advanced Encryption Standard
Ad Hoc
Wi-Fi Protected Access (WPA)
Temporal Key Integrity Protocol (TKIP)
Advanced Encryption Standard
25
Match
An authentication method that configures clients and access points with a shared key (called a secret or a passphrase). Only devices with the correct shared key can connect to the wireless network.
The electromagnetic field generated by a network cable or network device (such as a wireless router) that can be manipulated in order to eavesdrop on conversations or steal data.
An attack that spoofs the MAC address and then disconnects the device from the wireless network. Attackers can use this to stage evil twin or on-path attacks.
A signal passes through objects and the signal loses power.
Radio waves pass through objects of different densities, causing the signal to bend or change speeds.
Shared key authentication
Data emanation
Deauthentication attack
Absorption
Refraction
Shared key authentication
Data emanation
Deauthentication attack
Absorption
Refraction
Service set identifier (SSID)
Specify= Identify
A case-sensitive name that specifies a service set (network) to which a wireless device can join or connect to.
Some text here about the topic of discussion
Show answer
Auto Play
Slide 1 / 25
SLIDE
Similar Resources on Wayground
21 questions
Best Method: Solving Systems of Equations
Presentation
•
7th - 10th Grade
20 questions
Control System - Elements
Presentation
•
Professional Development
18 questions
Repairs and maintenance
Presentation
•
Professional Development
20 questions
Bible Trivia
Presentation
•
KG
21 questions
Cold War Intro
Presentation
•
KG
18 questions
Entry level Maths quiz
Presentation
•
Professional Development
19 questions
SIMPLE PAST TENSE
Presentation
•
Professional Development
17 questions
Mr Everson's Drama
Presentation
•
Professional Development
Popular Resources on Wayground
20 questions
STAAR Review Quiz #3
Quiz
•
8th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
6 questions
Marshmallow Farm Quiz
Quiz
•
2nd - 5th Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
20 questions
Inferences
Quiz
•
4th Grade
19 questions
Classifying Quadrilaterals
Quiz
•
3rd Grade
12 questions
What makes Nebraska's government unique?
Quiz
•
4th - 5th Grade