Chapter 8 Crossword
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
                                  
 
 
Down: 2) A framework for transporting authentication protocols that deines the format of the message5) An attack that sends unsolicited messages to Bluetooth-enabled devices6) A key value that must be created and entered into both the access point and all wireless devices prior to the devices communicating with the AP10) The user-supplied network name of a WLAN Across: 1) A wireless technology that uses short-range radio frequency transmissions and provides for rapid ad hoc device pairings3) An unauthorized AP that allows an attacker to bypass many of the network security configurations and opens the network and its users to attacks4) An attack that accesses unauthorized information from a wireless device through a Bluetooth connection7) An AP set up by an attacker to mimic an authorized AP and capture transmissions8) The second generation of WPA security from the Wi-Fi Alliance in 2003 to address authentication and encryption on WLANs.9) A method for controlling access to a WLAN based on the device's MAC address11) A WPA encryption technology12) Searching for wireless signals from an automobile or on foot using a portable computing device
 

 

Create your own Crossword Puzzle for Free!
 Show Errors as I Type