Level 24 Level 26
Level 25

346 - 360


15 words 0 ignored

Ready to learn       Ready to review

Ignore words

Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.

All None

Ignore?
Commonly available network security administrative capabilities include
Declaring ownership of programs, files and
Network administration
Is often inadequate, providing global access because of the limited administrative support
WLAN technologies
Conform to a variety of standards and offer varying levels of security features
The principal advantages of standards
Encourage mass production and to allow products from multiple vendors to
The most useful standard used
Is the IEEE 802.11 standard.
802.11
Refers to a family of specifications for wireless LAN technology.
IEEE 802.11's Wired Equivalent Privacy (WEP) encryption
Uses symmetric, private keys, which means the end
WEP
Leads to periodic difficulties distributing new keys to each NIC and keys remain unchanged on networks for
With static WEP keys
Several hacking tools easily break through the relatively weak WEP encryption mechanisms.
Because of the key reuse problem and other flaws
The current standardized version of WEP does not offer
and Wi-Fi Protected Access (WPA)
Utilize public key cryptography techniques to provide effective
A port
Is a logical connection.
TCP/IP designating a port
Is the way a client program specifies a particular server
a port number
Is a way to identify the specific process to which
For TCP, UDP and ICMP
A port number is a 16-bit integer that is put in