Level 24
Level 26
15 words 0 ignored
Ready to learn
Ready to review
Ignore words
Check the boxes below to ignore/unignore words, then click save at the bottom. Ignored words will never appear in any learning session.
Ignore?
Commonly available network security administrative capabilities include
Declaring ownership of programs, files and
Network administration
Is often inadequate, providing global access because of the limited administrative support
WLAN technologies
Conform to a variety of standards and offer varying levels of security features
The principal advantages of standards
Encourage mass production and to allow products from multiple vendors to
The most useful standard used
Is the IEEE 802.11 standard.
802.11
Refers to a family of specifications for wireless LAN technology.
IEEE 802.11's Wired Equivalent Privacy (WEP) encryption
Uses symmetric, private keys, which means the end
WEP
Leads to periodic difficulties distributing new keys to each NIC and keys remain unchanged on networks for
With static WEP keys
Several hacking tools easily break through the relatively weak WEP encryption mechanisms.
Because of the key reuse problem and other flaws
The current standardized version of WEP does not offer
and Wi-Fi Protected Access (WPA)
Utilize public key cryptography techniques to provide effective
A port
Is a logical connection.
TCP/IP designating a port
Is the way a client program specifies a particular server
a port number
Is a way to identify the specific process to which
For TCP, UDP and ICMP
A port number is a 16-bit integer that is put in