Question


a. active attacks f. request to send
b. association g. site survey
c. clear to send h. sniffing
d. pairwise keys i. TKIP
e. penetration testing j. WPA2
1/ any keys used between a pair of devices in TKIP
2/ an in-depth examination of a proposed wireless network site
3/ the process of using a variety of tools and techniques to attempt to break into a network
4/ a two-step process of being accepted into a wireless network
5/ a type of control frame that a station sends when it wants to transmit
6/ an encryption method devised as a replacement for WEP in WPA
7/ attacks that attempt to gather information for subsequent attacks by sending probe request frames on each available channel
8/ a type of control frame that gives a station clearance to begin transmitting packets
9/ the encryption and authentication architecture based on the final ratified IEEE 802.11i standard
10/ capturing network traffic during transmission

Answer

This answer is hidden. It contains 31 characters.