11. Networking Basics Flashcards
What modulates data over an entire range of frequencies using a series of signals known as chips?
Direct-Sequence Spread Spectrum (DSSS)
What allows devices to hop between predetermined frequencies?
Frequency-Hopping Spread Spectrum (FHSS)
What uses a slow modulation rate with simultaneous transmissions over 52 different data streams?
Orthagonal Frequency Multiplexing (OFDM)
How many channels can their be in the 2.4GHz spectrum, and which ones avoid overlapping?
11 or 14 | 1, 6, and 11
What range of frequencies can we use to run our wireless networks in the 5 GHz band?
5.725 ~ 5.875 GHz
How many non-overlapping channels are there in the 5 GHz band?
24
What allows for the creation of a wider channel by merging neighboring channels?
Channel bonding
What is the standard channel size for both the 2.4 and 5 GHz networks?
20 MHz
Which wireless standard is on the 5 GHz band and has a bandwidth of 54 Mbps?
802.11a
Which wireless standard is on the 2.4 GHz band and has a bandwidth of 11 Mbps?
802.11b
Which wireless standard is on the 2,4 GHz band and has a bandwidth of 54 Mbps?
802.11g
Which wireless standard is on both the 2.4 and 5 GHz bands and has a bandwidth of 150/600 Mbps (MIMO)?
802.11n (Wi-Fi 4)
Which wireless standard is on the 5 GHz band and has a bandwidth of 6.9 Gbps (MU-MIMO)?
802.11ac (Wi-Fi 5)
Which wireless standard is on the 2.4, 5, and 6 GHz bands and has a bandwidth of 9.6 Gbps (MU-MIMO)?
802.11ax (Wi-Fi 6)
What uses multiple antennas to send and receive more data?
Multiple-Input and Multiple-Output (MIMO)
What allows multiple users to access the wireless network and access point at the same time?
Multiple User MIMO (MU-MIMO)
What occurs when there are similar frequencies to wireless networks in the area?
Radio Frequency Interference (RFI)
What worsens as a signal decreases in strength or interference worsens?
Signal-to-noise ratio
What form of encryption key allows both the access point and the client to use the same one?
Pre-shared key
What was the original 802.11 wireless security standard, is an insecure protocol, and uses 24-bit Initialization vector (IV) sent in clear text?
Wired Equivalent Privacy (WEP)
What replaced WEP, follows the Temporal Key Integrity Protocol (TKIP), and uses 48-bit Initialization Vector (IV) instead of 24-bit?
Wi-Fi Protected Access (WPA)
What WPA specification is used for encryption?
Rivest Cipher 4 (RC4)
What WPA specification is used to confirm data was not modified in transit?
Message Integrity Check (MIC)
What WPA specification is used to authenticate users before exchanging keys?
Enterprise Mode