Crypto is Hipto | WiFi Bluetooth no cables needed |
---|---|
What is a Certificate Authority
This manages digital certificates
|
What are wired networks
WEP was designed to offer security comparable to this
|
What is Hashing
This is a kind of algorithm, a message digest if you will
|
What is a Site Survey
If I wanted to locate a wireless access point, I would do this
|
What are the number of keys
Because of this problems exist with Symmetric key distributions
|
What is Bluesnarfing
Reading information from a Bluetooth enabled device is this type of attack
|
What is transmitted data
SSL is used to secure data in this state
|
What is a Honeypot
You could say this is used to attract victims to connect
|
What is Level 3
in IPsec, encryption and other processes happen on this layer of the OSI model
|
What is WPA
Because of WPS support it's easy to defeat this wireless security standard
|