Match each item with an statement below:
A. the "network name" for the wireless network.
B. stream cipher that accepts keys up to 128 bits in length.
C. an encryption algorithm.
D. tool to perform WEP attacks.
E. can limit a user's access to the Internet.
F. looking over someone's shoulder.
G. adds two new security enhancements to WEP.
H. method of determining the keystream by analyzing two packets that were created from the same IV.
I. method of restricting access to resources.
A. SSID
B. RC4
C. Cipher
D. AirSnort
E. Access restrictions
F. Shoulder surfing
G. WEP2
H. Keystream attack
I. Access control
You might also like to view...
The Privacy menu is used to configure privacy options on an iOS device. Which of the following menus is used on an Android device?
a. Connections b. Device c. System d. Personal
A time complexity describes:
A. how the execution time of an algorithm changes as some other factor (usually the number of elements) changes B. the execution time of complex algorithms C. the complexities involved in timing a computer program D. the complexities involved in timing an algorithm