1/14 | 16 | 19 | ||||||||||||||||||||
2 | ||||||||||||||||||||||
3 | ||||||||||||||||||||||
4 | ||||||||||||||||||||||
5 | ||||||||||||||||||||||
6 | ||||||||||||||||||||||
7 | 18 | |||||||||||||||||||||
8 | ||||||||||||||||||||||
9/10 | 15 | 17 | ||||||||||||||||||||
11 | ||||||||||||||||||||||
12 | ||||||||||||||||||||||
13 | ||||||||||||||||||||||
1. The transmission of information between devices without the use of physical connections or cables.
2. A weakness or flaw in a system that can be exploited by attackers.
3. A network component that provides IP addresses and other network configuration information to devices requesting them.
4. A public IP address is an IP address that is used to identify a device on the public internet.
5. The process of verifying the identity of a user or system.
6. The assurance that data has not been altered or tampered with.
7. a wireless networking technology that allows devices to connect to the internet via a router
8. a device that forwards data packets between computer networks
9. The power level of a wireless signal, indicating the quality of communication between devices.
10. the power of a Wi-Fi signal, typically measured in decibels
11. A decentralized wireless network where each node cooperates to distribute network data, often used for increased coverage and improved reliability.
12. A process where a router or firewall rewrites the source IP address of a packet to a different IP address.
13. The process of breaking the encryption of a network to gain unauthorized access.
14. A type of computer network that allows devices to connect and communicate wirelessly.
15. IP lease refers to the period of time for which an IP address is assigned to a device using DHCP.
16. the process of encoding information to make it secure from unauthorized access
17. A very short-range wireless technology that enables communication between devices by bringing them close together.
18. A network that enables mobile devices to connect to the internet via wireless communication.
19. A set of rules and procedures for verifying the identity of a user or system.