MIS CH 8
_____ refers to efforts by unauthorized users to access data traveling over wireless networks.
Eavesdropping
The area of the earth reached by a satellite's transmission is referred to as its _____.
Footprint
With regard to mobile computing, _____ means that knowing where a user is physically located is a key to offering relevant products and services.
Localization of products and services
The greatest problem with GEO satellites is which of the following?
Propagation delay
A(n) _____ allows unauthorized entry into a wireless network.
Rogue access point
_____ refer(s) to the wireless communication of location-based information and control messages to and from vehicles and other mobile assets.
Telematics
_____ is the science that measures physical remoteness by means of wireless transmission from a remote source to a receiving station.
Telemetry
The act of locating wireless local area networks while moving around a city is called ____.
War driving
Which of the following is the most appropriate wireless networking standard for creating personal area networks
Bluetooth
_____ is a wireless standard that enables temporary, short-range connection between mobile devices.
Bluetooth
_____ communicate(s) via radio waves using radio antennas placed within adjacent geographic areas.
Cell phones
Although rogue access devices can be installed innocently, they can also be installed by an attacker trying to gain unauthorized access to a wireless network. In such cases, these devices are called an _____.
Evil twin
The major problem with RFID has been _______.
Expense
Which type of satellite has the largest footprint?
Geostationary
_____ is a satellite-based tracking system that enables users to determine a person s position.
Global positioning system
A small geographical perimeter within which a wireless access point provides service to a number of users is called a ________.
Hotspot
The most common wireless technology for TV and DVD remote control devices is _______.
Infrared
_____ networks use multiple Wi-Fi access points to create a wide area network.
Mesh
_____, with the shortest range of any wireless network, is designed to be used with contactless credit cards.
Near-field communications
In _____, a person or a device intentionally or unintentionally interferes with your wireless network transmissions.
RF jamming
The generic term for technologies that use radio waves to automatically identify individual items is __________.
Radio-frequency identification
Parking meters that you can pay via your mobile telephone are an example of _________.
Wireless electronic payment
_____ networks collect data from many points over an extended space.
Wireless sensor