Need key terms and multiple choice answered Designers created WTLS as a method to ensure Privacy of data being broadcast over WAP. Key Terms 2.4 GHz band (305) 5 GHz band (308) bluejacking B06) bluebugging (06) confidentiality 302) direct-sequence spread spectrum (DSSS) (308) Key Terms Quiz Use terms from the Key Terms list to complete the sentences that follow. Don\'t use the same term more than once. Not all terms will be used. 1. An AP uses to advertise its existence to potential wireless clients. 318 IEEE 802.11 (299) initialization vector (IV) 302) multiplex frequency division (OFDM) 308) RC4 stream cipher (310) service set identifier (SSID) (309) Wired Equivalent Privacy (wEP) 310) Wireless Application Protocol (wAPo 301 Wireless Transport Layer Security (wTLs) pozy 2. The is the part of the RC4 cipher that has a weak implementation in WEP is a standard for Ethernet authentication to 4. WAP uses the attempt to ensure confidentiality of data. Principles of Computer Security CompTIA Secuitye Solution 1. An AP uses ___ to advertise its existence to potential wireless clients -> Beacon Frames 2. The ___ is the part of the RC4 cipher that has a weak implementation in WEP -> Initialization Vector (IV) 3. ___ is a standard for Ethernet authentication. -> IEEE 802.1x 4. WAP uses the ___ protocol to attempt to ensure confidentiality of data. -> Wireless Transport Layer Security (WTLS) 5. The 32-character identifier attached to the header of a packet used for authentication to an 802.11 access point is the ___ -> Service Set Identifier (SSID) 6. 802.11g uses frequencies in the ___. -> 2.4 GHz Band 7. 802.11i updates the flawed security deployed in ___. -> Wired Equivalent Privacy (WEP) 8. The standard for wireless local area networks is called ___. -> IEEE 802.11 9. Cryptography in the WEP protocol is an attempt to guarantee ___. -> Confidentiality 10. 802.11a uses frequencies in the ___. -> 5 GHz band.