11. Networking Basics Flashcards

1
Q

What modulates data over an entire range of frequencies using a series of signals known as chips?

A

Direct-Sequence Spread Spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What allows devices to hop between predetermined frequencies?

A

Frequency-Hopping Spread Spectrum (FHSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What uses a slow modulation rate with simultaneous transmissions over 52 different data streams?

A

Orthagonal Frequency Multiplexing (OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many channels can their be in the 2.4GHz spectrum, and which ones avoid overlapping?

A

11 or 14 | 1, 6, and 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What range of frequencies can we use to run our wireless networks in the 5 GHz band?

A

5.725 ~ 5.875 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many non-overlapping channels are there in the 5 GHz band?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What allows for the creation of a wider channel by merging neighboring channels?

A

Channel bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the standard channel size for both the 2.4 and 5 GHz networks?

A

20 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which wireless standard is on the 5 GHz band and has a bandwidth of 54 Mbps?

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which wireless standard is on the 2.4 GHz band and has a bandwidth of 11 Mbps?

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which wireless standard is on the 2,4 GHz band and has a bandwidth of 54 Mbps?

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which wireless standard is on both the 2.4 and 5 GHz bands and has a bandwidth of 150/600 Mbps (MIMO)?

A

802.11n (Wi-Fi 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which wireless standard is on the 5 GHz band and has a bandwidth of 6.9 Gbps (MU-MIMO)?

A

802.11ac (Wi-Fi 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which wireless standard is on the 2.4, 5, and 6 GHz bands and has a bandwidth of 9.6 Gbps (MU-MIMO)?

A

802.11ax (Wi-Fi 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What uses multiple antennas to send and receive more data?

A

Multiple-Input and Multiple-Output (MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What allows multiple users to access the wireless network and access point at the same time?

A

Multiple User MIMO (MU-MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What occurs when there are similar frequencies to wireless networks in the area?

A

Radio Frequency Interference (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What worsens as a signal decreases in strength or interference worsens?

A

Signal-to-noise ratio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What form of encryption key allows both the access point and the client to use the same one?

A

Pre-shared key

20
Q

What was the original 802.11 wireless security standard, is an insecure protocol, and uses 24-bit Initialization vector (IV) sent in clear text?

A

Wired Equivalent Privacy (WEP)

21
Q

What replaced WEP, follows the Temporal Key Integrity Protocol (TKIP), and uses 48-bit Initialization Vector (IV) instead of 24-bit?

A

Wi-Fi Protected Access (WPA)

22
Q

What WPA specification is used for encryption?

A

Rivest Cipher 4 (RC4)

23
Q

What WPA specification is used to confirm data was not modified in transit?

A

Message Integrity Check (MIC)

24
Q

What WPA specification is used to authenticate users before exchanging keys?

A

Enterprise Mode

25
What was created as part of IEEE 802.11i standard and requires stronger encyption and integrity checking through CCMP?
Wi-Fi Protected Access 2 (WPA2)
26
What WPA2 specification is used to provide additional security by using 128-bit key or higher?
Advanced Encryption Standard (AES)
27
What WPA2 specification uses a pre-shared key?
Personal Mode
28
What WPA2 specification uses centralized authentication?
Enterprise Mode
29
What acronym(s) should WEP bring to mind on a test?
IV
30
What acronym(s) should WPA bring to mind on a test?
TKIP and RCA
31
What acronym(s) should WPA2 bring to mind on a test?
CCMP and AES
32
What refers to configuring an access point with a listing of permitted MAC addresses (like an ACL)?
MAC address filtering
33
What refers to configuring an access point not to broadcast the name of the wireless LAN?
Disabling SSID broadcast
34
What form of fixed wireless creates point-to-point connections from one building to another over a relatively short distance?
Wi-Fi (802.11)
35
What form of fixed wireless uses a larger antenna and a larger hotspot powered by a power outlet within an office or home?
Cellular
36
What form of fixed wireless creates point-to-point connections between two or more buildings over longer distances (generally up to 40 miles)?
Microwave
37
What type of Satellite fixed wireless requires more satellites to cover the entire planet but gives lower latency?
Low Earth Orbit
38
What type of Satellite fixed wireless allows one satellite to cover a large portion of the earth but gives higher latency and lower quality?
Geosynchronous Orbit
39
What uses radio frequency to send electromagnetic charge containing transaction data over a short distance?
Near Field Communication (NFC)
40
What is a form of radio frequency transmission that is modified for use in authentication systems?
Radio Frequency Identification (RFID)
41
What allows two devices to communicate using line of sight communication in the infrared spectrum?
Infrared Data (IrDA or IR)
42
What creates a personal area network over 2.4 GHz to allow for wireless connectivity?
Bluetooth
43
What form of attack on Bluetooth involves sending unsolicited messages to a Bluetooth device?
Bluejacking
44
What form of attack on Bluetooth involves making unauthorized access to a device via Bluetooth connection?
Bluesnarfing
45
What form of attack on Bluetooth involves allowing the attacker to gain complete control over a device without even being connected to it?
BlueBorne
46
What refers to sharing a cellular data internet connection from a smartphone to other devices, and should only be used to connect to trusted networks?
Tethering