3.3 Wireless Network Flashcards

You may prefer our related Brainscape-certified flashcards:
1
Q

What devices can use Wi-Fi?

A

Laptops, desktops, tablets, smartphones (IoT devices like lights, Tv’s etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What devices can use bluetooth?

A

Wireless headphones, connecting phones to car entertainment systems, keyboards etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is bluetooth?

A

A wireless method of connecting devices together over a short distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Features of bluetooth

A
  • Uses radio waves at 2.4GHz

- Devices are typically 10 metres of each other

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Bluetooth pairing?

A
  • A persistent link is made between the 2 devices
  • A device can ask for a passkey in order to pair to it - gives a layer of security like a password
  • When a paired device is close enough to communicate it will say that it is connected
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are passkeys?

A

Passkeys only need to be entered once and will be remembered by devices that are paired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless transmission

A

Commonly uses radio waves for communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Why is wireless transmission not reliable?

A

Susceptible to interference from objects and other nearby electronic or radio devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless NICs

A

Built into every networked device capable of connecting to a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Examples of devices that use NIC’s

A
  • PCs
  • Smart Phones
  • Wireless speakers
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

WAP (Wireless access point)

A

A device that allows wireless devices to connect to a wired network using Wi-Fi
The AP usually connects to a router via a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.11 types

A
  1. 11b/g/n uses 2.4GHz frequency

802. 11a/n/ac uses 5GHz frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

802.11b/g/n uses 2.4GHz frequency Advantages and Disadvantages

A
  • Greater range and coverage

- More interference from other devices as this is a crowded frequency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11a/n/ac uses 5GHz frequency Advantages and Disadvantages

A
  • Less crowded space with 23 non-overlapping channels with higher data transmission rates
  • Less able to penetrate through walls
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is intercepting data

A

Any intercepted data can be read and understood unless the data is encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is encryption?

A

Encryption is the encoding of data so that it can no longer be easily understood by a shift cipher

17
Q

Plaintext

A

Original message to be encrypted

18
Q

Ciphertext

A

The encrypted message

19
Q

Encryption

A

The process of converting plaintext into ciphertext

20
Q

Key

A

A sequence of numbers use to encrypt or decrypt, often data using a mathematical formula

21
Q

Encryption algorithm

A

The formula for encrypting the plaintext

22
Q

What are the 2 inputs for encryption?

A

Plaintext and a secret key

23
Q

Encryption techniques

A
Private key (Symmetric encryption)
Public key (Asymmetric encryption)
24
Q

What is private key?

A

A single key is used to encrypt and decrypt a message and must be given to the recipient of your message to decrypt the data

25
Q

What is a public key?

A

2 keys are used - one (public key) to encrypt and the other (private key) to decrypt data
This is more secure as it means that you never have to send or reveal your decryption key

26
Q

What is the Caesar Shift Cipher?

A

Earliest substitution cipher where each letter is replaced by a a letter n positions further on in the alphabet (symmetric encryption)q

27
Q

What methods of encryption are used when using wireless networks?

A

Most common wireless security standards are WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access)

28
Q

Why should you use WPA or WPA2 encryption methods?

A

The WEP method of encryption is older and can be cracked in seconds

29
Q

Why is HTTPS recommended for websites?

A

It encrypts data sent to and received from the site

30
Q

Strong encryption

A

When the useful lifetime of the encrypted data is less than the time taken to break the code

31
Q

Weak encryption

A

Code may be broken in time to use the information, but a lot of effort is required it might not be worth it

32
Q

How you could use wireless networks and network security in your life?

A

We use a wireless router at home. This contains a switch, route and modem all in one box. All our mobile devices connect to the WAP with Wi-Fi. It is encrypted with WPA2. We don’t use WEP as it is insecure. Where possible we try to connect to websites with HTTPS as this makes all data transmitted secure. Our TV and soundbar are connected to the box using Ethernet cables. Bluetooth is used to connect our headphones to smartphones