IS3120 CHAPTER 6 Flashcards
A server that provides authentication, authorization, and accounting for a network
AAA server
A system that uses a public key to encode data and a private key to decrypt data
Asymmetric encryption system
A WLAN network that includes an access point
Basic Service Set (BSS)
The number of nodes and the amount of shared bandwidth available to each node and coverage
Capacity
A modulation scheme defined in the IEEE 802.11b standard
Complementary code keying (CCK)
The attempt to provide the same level of signal strength to all network nodes.
Coverage
Application used to verify that the sender of a document, image, or message is a trusted source.
Digital signature
A modulation technique included in the IEEE 802.11x standard
Direct sequence spread spectrum (DSSS)
Adapts the nominal bit rate of a wireless node to better use a communication channel.
Dynamic rate shifting (DRS)
A WLAN that links together two BSS networks with a common linking device.
Extended Service Set (ESS)
An authentication method that is used in WLAMs and point-to-point connections
Extensible Authentication Protocol (EAP)
A peer-to-peer WLAN designation for each node in an ad hoc mode network.
Independent Basic Service Set (IBSS)
The 2.4 GHz bandwidth allocated to unlicensed use and used for 802.b/g/n
Industrial, scientific, and medical (ISM) bands
Cisco Systems’ version of EAP. It supports dynamic key encryption and mutual authentication
Lightweight Extensible Authentication Protocol (LEAP)
Prevents an attacker from intercepting, modifying, and retransmitting message packets by checking the integrity of a packet using the ICV.
Message integrity check (MIC)
The propagation that results in RF signals reaching the receiving antenna at different times and by two or more different paths.
Multipath
An antenna technology that uses multiple antennas (to receive and transmit) at both ends of a transmission.
Multiple-input and multiple-output (MIMO)
A process through which a node gains access to a wireless network running WEP and access rules that are not encrypted
Open System Authentication (OSA)
A frequency-division multiplexing (FDM) scheme that applies a digital multi-carrier modulation method
Orthogonal frequency division multiplexing (OFDM)
A technique that can modulated both analog and digital transmissions
Quadrature amplitude modulation(QAM)
A process through which a node gains access to a WLAN running the WEP protocol
Shared Key Authentication (SKA)
A system of encryption that applies the same exact key to encrypt and decrypt data
Symmetric encryption system
A security protocol used in the IEEE 802.11x wireless standard.
Temporal Key Integrity Protocol (TKIP)
The 5 GHz frequency band used by IEEE 802.11a devices
Unlicensed National Information Infrastructure (UNII)