In 802.11i, protection is provided between the client and the ________.
access point
The protection of communication between a wireless client and the access point is ________.
link security
The Wi-Fi Alliance calls 802.11i ________.
WPA2
After authentication in 80.11i PSK mode, a...
In 802.11i, protection is provided between the client and the ________.
access point
The protection of communication between a wireless client and the access point
is ________.
link security
The Wi-Fi Alliance calls 802.11i ________.
WPA2
After authentication in 80.11i PSK mode, a wireless client communicates with the
access point via a(n) ________ key.
pairwise session
In 802.11i PSK mode, the pass phrase should be at least ________ characters
long.
20
If a firm has many access points, it should use ________ initial authentication
mode in 802.11i.
802.1X
In 802.1x initial authentication mode, the authenticator is the ________.
wireless access point
A ________ is an unauthorized internal access point.
rogue
A rogue access point is usually created by ________.
an employee
An evil twin access point is usually ________.
a laptop computer
If a company uses 802.11i for its core security protocol, an evil twin access point
will set up ________ 802.11i connection(s).
two
In VPNs designed to frustrate evil twin attacks, the shared secret between the
client and the server is ________.
not transmitted
, A VPN provides ________.
end-to-end security
A group of devices on a desk that communicate wirelessly is called a ________.
PAN
Bluetooth ________ is likely to be used most of the time in IoT transmission.
LE
Bluetooth Low Energy ________.
conserves battery power
Bluetooth LE normally uses ________ for power.
a coin battery
Bluetooth uses ________ operation.
one-to-one
For a game joystick, you would use the ________ Bluetooth profile.
human interface device
In Bluetooth LE, ________ notify other Bluetooth devices that it is available.
advertisements
In Bluetooth LE, ________ provide information.
beacons
A Bluetooth profile for sending a command from a wireless light switch to a lamp
is probably a ________ profile.
Bluetooth LE
NFC transmission standards have been set for ________.
its service band
Wi-Fi direct ________ uses access points.
never
Zigbee is designed to be used in a(n) ________ network.
ad hoc
In Zigbee, ad hoc networking's mesh is operated by ________.
Zigbee Routers
________ can operate in the 2.4 service band.
Zigbee
In IoT device transmission, published distance limits are relevant for ________.
legitimate users
The state of security in IoT transmission standards is ________.
mixed
Ethernet standards are set at the ________.
physical layer
TCP/IP standards are set at the ________.
transport layer
UDP is a standard for ________.
packet delivery
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller tuition. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.