5 Flashcards

1
Q

Which cellular generation do these fall under?
GSM

A

2G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which cellular generation do these fall under?
GPRS
EDGE

A

2.5G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which cellular generation do these falls under?
UMTS
HSPA

A

3G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which cellular generation do these fall under?
LTE
LTE-Advanced

A

4G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which cellular generation do these fall under?
NR

A

5G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Access Methodology
What are the steps of clear channel assement?

_________________ uses AP to send a packet w/ a _________________. Stations set a ___________
______________ begins when that hits zero
A ______________ is assigned, once that hits zero station will listen. If Commnications are heard it will ____ transmit, if they aren’t heard it ___________

A

Virtual carrier sensing
Duration ID
NAV TIMER
Physical carrier sensing
random back off
not
will transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four steps when connecting to a service set?

Which of these are optional?

A

Authentication
Association
Network Authentication

Network Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Within the Discovery step what are the two types of scanning involved and how are they defined?

A

Passive Scanning:
Client is listening for Beacon from the Access point

Active Scanning:
Clients send a Probe Request
Client is listening for a Probe response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three authentication types?

A

Open System
SKA
SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of Open System authentication?

What encryptions must be used with it?

A

-Null method
- optional mac filtering

None, WPA1/2, WEP(OPEN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of Shared Key Authentication(SKA) authentication

What encryptions must be used with it?

A
  • Only WEP key used

-SKA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the characteristics of Simultaneous Authentication encryption of equals (SAE)

What encryptions must be used with it?

A

uses ECC to create encryption

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of the association step when connecting to a service set?

A

Clients can AUTHENTICATE (save credentials) to multiple AP’s But can only Associate (connect too) one AP at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four types of Requests/Reponses sent during authentication?

A

Association Request
Association Response
Reassociation Request
Reassociation Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three steps during network authentication?

A

802.1X/EAP > 4 way handshake > data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advanced Topologies
_____________ commonly referred to as a municipal Wi-Fi network

It uses ___________ to put stations in mesh mode

_________ - forwards packets
_________ - provides connectivity
_________ - forwards packets and provides connectivity

A

Mesh basic service set

802.11s

mesh point
mesh portal point
mesh access point

17
Q

Advanced Topologies
___________ is AP-AP provides wireless connectivity for networks NO CLIENTS ALLOWED

A

Bridge mode

18
Q

Advanced Topologies
___________ like bridge mode but clients are allowed

everything connected to root including other AP’s are denoted using _____________

A

Workgroup Bridge

Managed mode

19
Q

Advanced Topologies
____________ Significantly reduces throughput

A

Repeater

20
Q

Advanced Topologies
___________ Virtual Wireless network by authenticating to a website

Does not restrict unfiltered traffic T/F?

Authentication is verified by ___________ or _____________

A

Captive Portal

T

Source MAC/IP

21
Q

_____________ provides a limited resource environment for unauthenticated users

A

Walled Garden

22
Q

What Cipher and Wi-Fi Alliance certification is given to WEP?

A

RC4
N/A

23
Q

What Cipher and Wi-Fi Alliance certification is given to TKIP

A

RC4
WPA

24
Q

What Cipher and Wi-Fi Alliance certification is given to CCMP

A

AES
WPA2

25
Q

What Cipher and Wi-Fi Alliance certification is given to GCMP.256

A

AES
WPA3

26
Q

How big is a WEP Key?

A

40-104 bits

27
Q

How is WEP encrypted?

A

IV value and wep key is generated
the WEP key is encrypted using RC4
IV value is plaintext and added to the front of the output

28
Q

_____________ takes advantage of IV sent in plaintext

A

Statistical analysis attack