11. Networking Basics Flashcards

1
Q

What modulates data over an entire range of frequencies using a series of signals known as chips?

A

Direct-Sequence Spread Spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What allows devices to hop between predetermined frequencies?

A

Frequency-Hopping Spread Spectrum (FHSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What uses a slow modulation rate with simultaneous transmissions over 52 different data streams?

A

Orthagonal Frequency Multiplexing (OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How many channels can their be in the 2.4GHz spectrum, and which ones avoid overlapping?

A

11 or 14 | 1, 6, and 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What range of frequencies can we use to run our wireless networks in the 5 GHz band?

A

5.725 ~ 5.875 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How many non-overlapping channels are there in the 5 GHz band?

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What allows for the creation of a wider channel by merging neighboring channels?

A

Channel bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the standard channel size for both the 2.4 and 5 GHz networks?

A

20 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which wireless standard is on the 5 GHz band and has a bandwidth of 54 Mbps?

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which wireless standard is on the 2.4 GHz band and has a bandwidth of 11 Mbps?

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which wireless standard is on the 2,4 GHz band and has a bandwidth of 54 Mbps?

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which wireless standard is on both the 2.4 and 5 GHz bands and has a bandwidth of 150/600 Mbps (MIMO)?

A

802.11n (Wi-Fi 4)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which wireless standard is on the 5 GHz band and has a bandwidth of 6.9 Gbps (MU-MIMO)?

A

802.11ac (Wi-Fi 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which wireless standard is on the 2.4, 5, and 6 GHz bands and has a bandwidth of 9.6 Gbps (MU-MIMO)?

A

802.11ax (Wi-Fi 6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What uses multiple antennas to send and receive more data?

A

Multiple-Input and Multiple-Output (MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What allows multiple users to access the wireless network and access point at the same time?

A

Multiple User MIMO (MU-MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What occurs when there are similar frequencies to wireless networks in the area?

A

Radio Frequency Interference (RFI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What worsens as a signal decreases in strength or interference worsens?

A

Signal-to-noise ratio

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What form of encryption key allows both the access point and the client to use the same one?

A

Pre-shared key

20
Q

What was the original 802.11 wireless security standard, is an insecure protocol, and uses 24-bit Initialization vector (IV) sent in clear text?

A

Wired Equivalent Privacy (WEP)

21
Q

What replaced WEP, follows the Temporal Key Integrity Protocol (TKIP), and uses 48-bit Initialization Vector (IV) instead of 24-bit?

A

Wi-Fi Protected Access (WPA)

22
Q

What WPA specification is used for encryption?

A

Rivest Cipher 4 (RC4)

23
Q

What WPA specification is used to confirm data was not modified in transit?

A

Message Integrity Check (MIC)

24
Q

What WPA specification is used to authenticate users before exchanging keys?

A

Enterprise Mode

25
Q

What was created as part of IEEE 802.11i standard and requires stronger encyption and integrity checking through CCMP?

A

Wi-Fi Protected Access 2 (WPA2)

26
Q

What WPA2 specification is used to provide additional security by using 128-bit key or higher?

A

Advanced Encryption Standard (AES)

27
Q

What WPA2 specification uses a pre-shared key?

A

Personal Mode

28
Q

What WPA2 specification uses centralized authentication?

A

Enterprise Mode

29
Q

What acronym(s) should WEP bring to mind on a test?

A

IV

30
Q

What acronym(s) should WPA bring to mind on a test?

A

TKIP and RCA

31
Q

What acronym(s) should WPA2 bring to mind on a test?

A

CCMP and AES

32
Q

What refers to configuring an access point with a listing of permitted MAC addresses (like an ACL)?

A

MAC address filtering

33
Q

What refers to configuring an access point not to broadcast the name of the wireless LAN?

A

Disabling SSID broadcast

34
Q

What form of fixed wireless creates point-to-point connections from one building to another over a relatively short distance?

A

Wi-Fi (802.11)

35
Q

What form of fixed wireless uses a larger antenna and a larger hotspot powered by a power outlet within an office or home?

A

Cellular

36
Q

What form of fixed wireless creates point-to-point connections between two or more buildings over longer distances (generally up to 40 miles)?

A

Microwave

37
Q

What type of Satellite fixed wireless requires more satellites to cover the entire planet but gives lower latency?

A

Low Earth Orbit

38
Q

What type of Satellite fixed wireless allows one satellite to cover a large portion of the earth but gives higher latency and lower quality?

A

Geosynchronous Orbit

39
Q

What uses radio frequency to send electromagnetic charge containing transaction data over a short distance?

A

Near Field Communication (NFC)

40
Q

What is a form of radio frequency transmission that is modified for use in authentication systems?

A

Radio Frequency Identification (RFID)

41
Q

What allows two devices to communicate using line of sight communication in the infrared spectrum?

A

Infrared Data (IrDA or IR)

42
Q

What creates a personal area network over 2.4 GHz to allow for wireless connectivity?

A

Bluetooth

43
Q

What form of attack on Bluetooth involves sending unsolicited messages to a Bluetooth device?

A

Bluejacking

44
Q

What form of attack on Bluetooth involves making unauthorized access to a device via Bluetooth connection?

A

Bluesnarfing

45
Q

What form of attack on Bluetooth involves allowing the attacker to gain complete control over a device without even being connected to it?

A

BlueBorne

46
Q

What refers to sharing a cellular data internet connection from a smartphone to other devices, and should only be used to connect to trusted networks?

A

Tethering