1 | 14 | 16 | 19 | |||||||||||||||||||
2 | ||||||||||||||||||||||
3 | ||||||||||||||||||||||
4 | ||||||||||||||||||||||
5/17 | ||||||||||||||||||||||
6 | 15 | |||||||||||||||||||||
18 | ||||||||||||||||||||||
7 | ||||||||||||||||||||||
8 | ||||||||||||||||||||||
9 | ||||||||||||||||||||||
10 | 13 | |||||||||||||||||||||
11 | ||||||||||||||||||||||
12 | ||||||||||||||||||||||
1. A security protocol for wireless networks that improves upon the security features of WEP.
2. In asymmetric encryption, a key that is kept secret and used for decryption.
3. A unique identifier assigned to network interfaces for communications on the physical network segment.
4. Malware that secretly gathers information about a person or organization without their consent.
5. Information sent from the receiver to the sender to indicate whether data packets have been successfully received or not.
6. The maximum amount of data that can be transmitted over a network connection in a given amount of time.
7. A method used to scramble data using a secret code in order to protect it from unauthorized access.
8. A network where all devices have equal capabilities and responsibilities, and can directly communicate with each other without a central server.
9. The practice of connecting computers and other devices together to share information and resources.
10. A network component that provides IP addresses and other network configuration information to devices requesting them.
11. A set of rules and procedures for verifying the identity of a user or system.
12. a cyclic redundancy check algorithm used to detect accidental changes or errors in data
13. Category 5e is an Ethernet cable frequently utilized in wired networks, enabling data transmission speeds of up to 1000 Mbps.
14. A networking device that forwards data packets between computer networks.
15. A set of rules that govern the exchange of data between devices in a network.
16. Storing older or infrequently accessed data in a separate location to prevent loss without cluttering the primary storage.
17. The negative repercussions on an organization's finances due to data loss, including potential revenue loss and costs associated with data recovery.
18. A top-level domain is the last part of a domain name that follows the final dot, such as .com, .org, or .net.
19. A protocol used for secure remote access to a device over the internet.