MIS CH 8

¡Supera tus tareas y exámenes ahora con Quizwiz!

_____ refers to efforts by unauthorized users to access data traveling over wireless networks.

Eavesdropping

The area of the earth reached by a satellite's transmission is referred to as its _____.

Footprint

With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services.

Localization of products and services

The greatest problem with GEO satellites is which of the following?

Propagation delay

A(n) _____ allows unauthorized entry into a wireless network.

Rogue access point

_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.

Telematics

_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station.

Telemetry

The act of locating wireless local area networks while moving around a city is called ____.

War driving

Which of the following is the most appropriate wireless networking standard for creating personal area networks

Bluetooth

_____ is a wireless standard that enables temporary, short-range connection between mobile devices.

Bluetooth

_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.

Cell phones

Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.

Evil twin

The major problem with RFID has been _______.

Expense

Which type of satellite has the largest footprint?

Geostationary

_____ is a satellite-based tracking system that enables users to determine a person s position.

Global positioning system

A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.

Hotspot

The most common wireless technology for TV and DVD remote control devices is _______.

Infrared

_____ networks use multiple Wi-Fi access points to create a wide area network.

Mesh

_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards.

Near-field communications

In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.

RF jamming

The generic term for technologies that use radio waves to automatically identify individual items is __________.

Radio-frequency identification

Parking meters that you can pay via your mobile telephone are an example of _________.

Wireless electronic payment

_____ networks collect data from many points over an extended space.

Wireless sensor


Conjuntos de estudio relacionados

Periodic Table Of The Elements 1-40

View Set

Physics 1 Calculus Based Chapters 2-4 Practice Tests Answers

View Set

E2 Economic rights ownership and property rights economic challenges

View Set

Business Finance Exam 4 concepts

View Set