Match each term with the correct statement below.

A. an encrypted alternative to the Telnet protocol that is used to access
remote computers
B. using wireless technologies for asset tracking of wireless equipment
C. device in an IEEE 802.1X network that makes an appeal for access
D. a method for auditing usage by using an algorithm to determine if a threat exists
E. a standard originally developed for wired networks that blocks all traffic on
a port-by-port basis until the client is authenticated
F. a security management system that constantly monitors the RF for attacks and sounds an alert if one is detected
G. an encryption cipher that takes one character and replaces it with another
character
H. dynamically generating a new key for each packet to preventing collisions
I. providing access based on a user's job function within an organization
J. a device in an IEEE 802.1X network that accepts or rejects a supplicant

A. secure shell
B. real-time location services
C. supplicant
D. heuristic monitoring
E. 802.1X
F. wireless intrusion detection system
G. stream cipher
H. per-packet key
I. Role-Based Access Control
J. authenticator

Computer Science & Information Technology

You might also like to view...

If the year is left off when entering a date in Excel, the current year is assumed, but does not display in the cell.

a. true b. false

Computer Science & Information Technology

MC A______ can be compared to a pile of dishes.

a) queue. b) stack. c) list. d) None of the above.

Computer Science & Information Technology