CSCI 304 Networking and Security Chapter Six
Bluesnarfing
A hacker takes advantage of a Bluetooth connection to send a virus to a user's phone. What kind of security breach has occurred?
NFC
A user swipes her smartphone across a tag on a poster to obtain showtimes for a movie she wants to see later that evening. What wireless technology transmitted the data?
frequency
To exchange information, two antennas must be tuned to the same ______.
Layer 3
What is the lowest layer of the OSI model at which wired and wireless transmissions share the same protocols?
Reflect
When a wireless signal encounters a large obstacle, what happens to the signal?
802.11n
Which 802.11 standard functions in both the 2.4-GHz and 5-GHz bands?
CSMA/CA
Which Carrier Sense technology is used on wireless networks to reduce collisions?
ANT+
Which IoT wireless standard is used to sync data from a smartwatch, bike computer, and smart phone to a single user account?
Evil Twin
You just settled in for some study time at the local coffee shop, and you pause long enough to connect your computer to the Wi-Fi so you can listen to some music while you study. As you're about to sign in, you realize you clicked on an SSID called "Free Coffee and Internet." What kind of security trap did you almost fall for?
Guest Network
You're setting up a home network for your neighbor, who is a music teacher. She has students visiting her home regularly for lessons and wants to provide Internet access for their parents while they're waiting on the children. However, she's concerned about keeping her own data private. What wireless feature can you set up on her AP to meet her requests?
Rogue AP
You've just completed a survey of the wireless signals traversing the airspace in your employer's vicinity, and you've found an unauthorized AP with a very strong signal near the middle of the 100-acre campus. What kind of threat do you need to report to your boss?