16
Final Review

Kerala girl pron sex vedio mp4 xxx - Two Professors Home Page2profs.net/steve/CIS420/CIS420FinalReview.pdf%PDF-1.5 %âãÏÓ 80 0 obj endobj 89 0 obj /Filter/FlateDecode/ID[]/Index[80

Embed Size (px)

Citation preview

Final Review

IEEE 802.11 is the standard for? 802.11A Operates at what frequency? 802.11B Operates at what frequency? 802.11G Operates at what frequency? Which three IEEE 802.11B/G channels do not

overlap each other? Will changing the default channel from 6 to 11

will make your network more secure?

What encryption schemes can be used to protect wireless networks?

Will changing the default SSID make a network more secure?

One of the steps that is taken to secure wireless networks is to use MAC address filtering because _____.

What does MAC stand for? What is the purpose of MAC filtering? Is WEP enabled by default on a wireless access

poiint? Is WEP highly secure?

Which of the following is the most secure? WEP 64bit WEP 128bit WPA (TKIP) WPA2

What is a beacon?

What is a rogue access point

What is an SSID?

What is an unauthorized access point called?

What is the name for an attempt to discover your username/password or account numbers by sending an email that appears to come from your bank or other official site?

What is the name for an email containing a FALSE warning or fraudulent offering?

What does PGP stand for?

What is the name for the the ONE key method used for encryption of email and other files?

What is the name for the the TWO key method used for encryption of email and other files?

What is the primary TCP/IP sub-protocol used for moving mail between mail-servers on the Internet?

Which email protocol downloads messages from the server and stores them only on your personal computer?

The sender’s address is a reliable way to verify that an email is from someone you trust.

Attachments (like a Word document) are converted to text in order to send them via email

The sender’s address is a reliable way to verify that an email is from someone you trust.

List some anti-spyware tools