3 Wireless Networking Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

3.1.12

Outline the advantages of wireless networking

A
  • Users can connect to the network from various locations within the coverage area, enabling mobility
  • It could be more cost effective as it does not require extensive cabling
  • It is much more flexible and scalable as it is adaptable to changing environments and configurations (don’t have to rearange cabling and it is easy to add access points)
  • Lack of cabling means people won’t trip and get hurt from cables
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

3.1.12

Outline the disadvantages of wireless networking

A
  • They are subject to environmental interference from physical obstacles or electronic devices. This makes wireless networks less consistent than wired networks.
  • wireless networks typically have lower bandwidth and data transmission speeds than wired cables due to packet loss, environmental interference, and because wireless mediums need to share bandwidth compared to cables.
  • There is a limited physical range or coverage area, and signal strength decreases with distance from the access point.
  • If not properly secured, it could be vulnerable to unauthorised access and data interception.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

3.1.13

Describe NICs

A

They are hardware components installed in devices which allow them to connect to a network. It allows the device to send and receive data over the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

3.1.13

Describe wireless access points

A

Allows wireless devices to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

3.1.13

Describe wireless routers

A

A wireless router serves as a central hub for multiple devices to connect and communicate within a network. It also manages data traffic within a network, forwarding and routing data packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

3.1.13

Describe the software components of a wireless network

A

Antivirus software: Detects and removes viruses that can compromise the network.

Firewall software: Monitors and filters incoming and outgoing network traffic, ensuring that only data which meets its set of rules get to access the network.

WLAN protocols: Defines the rules and standards for wireless communication. They specify how data is transmitted, received, and organized into packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

3.1.14

Describe WiMAX

A

WiMAX stands for Worldwide Interoperability for Microwave Access. It is a wireless communication technology which uses microwave radio waves to provide access to the internet. It is designed as a cheap method which covers a large area. However, it is slower than Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

3.1.14

Describe 3G mobile networking

A

3G (third generation) mobile networking is a mobile networking standard for data transmission. It is rather slow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

3.1.14

Describe 4G mobile networking

A

4G (fourth generation) mobile networking is a mobile networking standard which is an upgrade to 3G. With 4G, people could easily watch videos, make videos, and use apps that needed a lot of data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3.1.15

Describe three factor authentication

A

Three factor authentication typically falls into three categories:
Something you know (Knowledge-based): Passwords, PIN (personal identification number), Security questions (e.g. What is your son in law’s middle name?)
Something you have (possession-based): Keys, identity cards, authentication code sent to mobile device
Something you are (biometric-based): fingerprints, facial recognition, iris scan

It is often used to ensure people accessing networks are authorised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

3.1.15

Describe firewalls

A

Firewalls are hardware or software (or both) which monitors and filters incoming and out-going network traffic (data packets). They do so by implementing a set of rules and policies that determine which data packets are allowed to pass through and which should be blocked or filtered.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3.1.15

Describe MAC addresses

A

Media Access Control (MAC) addresses are unique identifiers assigned to network devices. With MAC addresses, network administators can create Access Control Lists (ACLs) that allow or deny network access for specific devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

3.1.15

Describe physical security as a method of network security

A

You can protect network infrastructure with locked doors, security guards, reinforced rooms, CCTV, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

3.1.15

Describe encryption

A

Encryption is the process of converting data into a coded format to prevent unauthorized access, making it readable only to those with the proper decryption key or algorithm.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

3.1.16

Evaluate encryption

A

Advantages:
* Encryption prevents data from being read by unauthorised individuals
* Encryption ensures data integrity
Disadvantages:
* If different systems or applications use different encryption methods, compatibility issues may arise. This could be an issue in business mergers.
* Losing encryption keys can result in permanent data loss

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

3.1.16

Evaluate MAC addresses

A

Advantages:
* MAC addresses allow networks to identify devices in a network.
* It also allows certain devices to be whitelisted or blacklisted from a network so access can be restricted.

Disadvantages:
* The whitelist has to be amended every time a device is switched
* Malicious attackers could gain access to an whitelisted device and gain access to the network. (MAC addresses only identify the device, not who is using it)