2.3 Wireless Networks Flashcards
What are the two main Wi-Fi frequency bands?
2.4 GHz and 5 GHz.
What are the advantages of the 2.4 GHz Wi-Fi band?
Longer range, better wall penetration, but more interference.
What are the advantages of the 5 GHz Wi-Fi band?
Faster speeds, less interference, but shorter range.
What is the speed and frequency of 802.11a?
54 Mbps, 5 GHz.
What is the speed and frequency of 802.11b?
11 Mbps, 2.4 GHz.
What is the speed and frequency of 802.11g?
54 Mbps, 2.4 GHz.
What is the maximum speed of 802.11n, and what feature does it support?
Up to 600 Mbps, supports MIMO (Multiple Input Multiple Output).
What is the maximum speed of 802.11ac, and what technology does it use?
Over 1 Gbps, uses beamforming for better signal targeting.
What are the benefits of 802.11ax (Wi-Fi 6)?
Higher efficiency, improved range in crowded environments, operates on both 2.4 GHz and 5 GHz bands.
Which wireless security protocol is the weakest and outdated?
WEP (Wired Equivalent Privacy).
What encryption standard does WPA2 use?
AES (Advanced Encryption Standard).
What is the purpose of MAC filtering in wireless security?
Restricts access by allowing only approved MAC addresses to connect.
What does disabling SSID broadcast do?
Hides the network name from casual users.
What are examples of fixed wireless technologies?
Cellular (4G/5G), microwave, and satellite.
What are the drawbacks of satellite internet?
High latency and weather interference.
What is NFC used for?
Contactless payments (e.g., Apple Pay, Google Pay).
What is RFID used for?
Inventory tracking, access control.
What type of devices commonly use Infrared (IR) for communication?
TV remotes and older wireless peripherals.
What is Bluetooth commonly used for?
Wireless data transfer between personal devices (headphones, keyboards, smartwatches).
What are the key steps in setting up a SOHO wireless network?
Configure router, set SSID, apply WPA2 encryption, optimize network performance.
What is the primary security risk of using WEP encryption?
It is easily cracked with modern tools.
Why is disabling SSID broadcast not a foolproof security measure?
Advanced users can still detect hidden networks using scanning tools.