5 Flashcards

1
Q

Which cellular generation do these fall under?
GSM

A

2G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which cellular generation do these fall under?
GPRS
EDGE

A

2.5G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which cellular generation do these falls under?
UMTS
HSPA

A

3G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which cellular generation do these fall under?
LTE
LTE-Advanced

A

4G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which cellular generation do these fall under?
NR

A

5G

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Access Methodology
What are the steps of clear channel assement?

_________________ uses AP to send a packet w/ a _________________. Stations set a ___________
______________ begins when that hits zero
A ______________ is assigned, once that hits zero station will listen. If Commnications are heard it will ____ transmit, if they aren’t heard it ___________

A

Virtual carrier sensing
Duration ID
NAV TIMER
Physical carrier sensing
random back off
not
will transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the four steps when connecting to a service set?

Which of these are optional?

A

Authentication
Association
Network Authentication

Network Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Within the Discovery step what are the two types of scanning involved and how are they defined?

A

Passive Scanning:
Client is listening for Beacon from the Access point

Active Scanning:
Clients send a Probe Request
Client is listening for a Probe response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the three authentication types?

A

Open System
SKA
SAE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are the characteristics of Open System authentication?

What encryptions must be used with it?

A

-Null method
- optional mac filtering

None, WPA1/2, WEP(OPEN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the characteristics of Shared Key Authentication(SKA) authentication

What encryptions must be used with it?

A
  • Only WEP key used

-SKA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the characteristics of Simultaneous Authentication encryption of equals (SAE)

What encryptions must be used with it?

A

uses ECC to create encryption

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the characteristics of the association step when connecting to a service set?

A

Clients can AUTHENTICATE (save credentials) to multiple AP’s But can only Associate (connect too) one AP at a time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the four types of Requests/Reponses sent during authentication?

A

Association Request
Association Response
Reassociation Request
Reassociation Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three steps during network authentication?

A

802.1X/EAP > 4 way handshake > data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Advanced Topologies
_____________ commonly referred to as a municipal Wi-Fi network

It uses ___________ to put stations in mesh mode

_________ - forwards packets
_________ - provides connectivity
_________ - forwards packets and provides connectivity

A

Mesh basic service set

802.11s

mesh point
mesh portal point
mesh access point

17
Q

Advanced Topologies
___________ is AP-AP provides wireless connectivity for networks NO CLIENTS ALLOWED

A

Bridge mode

18
Q

Advanced Topologies
___________ like bridge mode but clients are allowed

everything connected to root including other AP’s are denoted using _____________

A

Workgroup Bridge

Managed mode

19
Q

Advanced Topologies
____________ Significantly reduces throughput

20
Q

Advanced Topologies
___________ Virtual Wireless network by authenticating to a website

Does not restrict unfiltered traffic T/F?

Authentication is verified by ___________ or _____________

A

Captive Portal

T

Source MAC/IP

21
Q

_____________ provides a limited resource environment for unauthenticated users

A

Walled Garden

22
Q

What Cipher and Wi-Fi Alliance certification is given to WEP?

23
Q

What Cipher and Wi-Fi Alliance certification is given to TKIP

24
Q

What Cipher and Wi-Fi Alliance certification is given to CCMP

25
What Cipher and Wi-Fi Alliance certification is given to GCMP.256
AES WPA3
26
How big is a WEP Key?
40-104 bits
27
How is WEP encrypted?
IV value and wep key is generated the WEP key is encrypted using RC4 IV value is plaintext and added to the front of the output
28
_____________ takes advantage of IV sent in plaintext
Statistical analysis attack