Need key terms and multiple choice answered Designers create
Solution
1. An AP uses ___ to advertise its existence to potential wireless clients
-> Beacon Frames
2. The ___ is the part of the RC4 cipher that has a weak implementation in WEP
-> Initialization Vector (IV)
3. ___ is a standard for Ethernet authentication.
-> IEEE 802.1x
4. WAP uses the ___ protocol to attempt to ensure confidentiality of data.
-> Wireless Transport Layer Security (WTLS)
5. The 32-character identifier attached to the header of a packet used for authentication to an 802.11 access point is the ___
-> Service Set Identifier (SSID)
6. 802.11g uses frequencies in the ___.
-> 2.4 GHz Band
7. 802.11i updates the flawed security deployed in ___.
-> Wired Equivalent Privacy (WEP)
8. The standard for wireless local area networks is called ___.
-> IEEE 802.11
9. Cryptography in the WEP protocol is an attempt to guarantee ___.
-> Confidentiality
10. 802.11a uses frequencies in the ___.
-> 5 GHz band
