Need key terms and multiple choice answered Designers create
Solution
1. An AP uses ___ to advertise its existence to potential wireless clients
 -> Beacon Frames
2. The ___ is the part of the RC4 cipher that has a weak implementation in WEP
 -> Initialization Vector (IV)
3. ___ is a standard for Ethernet authentication.
 -> IEEE 802.1x
4. WAP uses the ___ protocol to attempt to ensure confidentiality of data.
 -> Wireless Transport Layer Security (WTLS)
5. The 32-character identifier attached to the header of a packet used for authentication to an 802.11 access point is the ___
 -> Service Set Identifier (SSID)
6. 802.11g uses frequencies in the ___.
 -> 2.4 GHz Band
7. 802.11i updates the flawed security deployed in ___.
 -> Wired Equivalent Privacy (WEP)
8. The standard for wireless local area networks is called ___.
 -> IEEE 802.11
9. Cryptography in the WEP protocol is an attempt to guarantee ___.  
 -> Confidentiality
10. 802.11a uses frequencies in the ___.
 -> 5 GHz band

