5 Flashcards
Which cellular generation do these fall under?
GSM
2G
Which cellular generation do these fall under?
GPRS
EDGE
2.5G
Which cellular generation do these falls under?
UMTS
HSPA
3G
Which cellular generation do these fall under?
LTE
LTE-Advanced
4G
Which cellular generation do these fall under?
NR
5G
Network Access Methodology
What are the steps of clear channel assement?
_________________ uses AP to send a packet w/ a _________________. Stations set a ___________
______________ begins when that hits zero
A ______________ is assigned, once that hits zero station will listen. If Commnications are heard it will ____ transmit, if they aren’t heard it ___________
Virtual carrier sensing
Duration ID
NAV TIMER
Physical carrier sensing
random back off
not
will transmit
What are the four steps when connecting to a service set?
Which of these are optional?
Authentication
Association
Network Authentication
Network Authentication
Within the Discovery step what are the two types of scanning involved and how are they defined?
Passive Scanning:
Client is listening for Beacon from the Access point
Active Scanning:
Clients send a Probe Request
Client is listening for a Probe response
What are the three authentication types?
Open System
SKA
SAE
What are the characteristics of Open System authentication?
What encryptions must be used with it?
-Null method
- optional mac filtering
None, WPA1/2, WEP(OPEN)
What are the characteristics of Shared Key Authentication(SKA) authentication
What encryptions must be used with it?
- Only WEP key used
-SKA
What are the characteristics of Simultaneous Authentication encryption of equals (SAE)
What encryptions must be used with it?
uses ECC to create encryption
WPA3
What are the characteristics of the association step when connecting to a service set?
Clients can AUTHENTICATE (save credentials) to multiple AP’s But can only Associate (connect too) one AP at a time
What are the four types of Requests/Reponses sent during authentication?
Association Request
Association Response
Reassociation Request
Reassociation Response
What are the three steps during network authentication?
802.1X/EAP > 4 way handshake > data
Advanced Topologies
_____________ commonly referred to as a municipal Wi-Fi network
It uses ___________ to put stations in mesh mode
_________ - forwards packets
_________ - provides connectivity
_________ - forwards packets and provides connectivity
Mesh basic service set
802.11s
mesh point
mesh portal point
mesh access point
Advanced Topologies
___________ is AP-AP provides wireless connectivity for networks NO CLIENTS ALLOWED
Bridge mode
Advanced Topologies
___________ like bridge mode but clients are allowed
everything connected to root including other AP’s are denoted using _____________
Workgroup Bridge
Managed mode
Advanced Topologies
____________ Significantly reduces throughput
Repeater
Advanced Topologies
___________ Virtual Wireless network by authenticating to a website
Does not restrict unfiltered traffic T/F?
Authentication is verified by ___________ or _____________
Captive Portal
T
Source MAC/IP
_____________ provides a limited resource environment for unauthenticated users
Walled Garden
What Cipher and Wi-Fi Alliance certification is given to WEP?
RC4
N/A
What Cipher and Wi-Fi Alliance certification is given to TKIP
RC4
WPA
What Cipher and Wi-Fi Alliance certification is given to CCMP
AES
WPA2
What Cipher and Wi-Fi Alliance certification is given to GCMP.256
AES
WPA3
How big is a WEP Key?
40-104 bits
How is WEP encrypted?
IV value and wep key is generated
the WEP key is encrypted using RC4
IV value is plaintext and added to the front of the output
_____________ takes advantage of IV sent in plaintext
Statistical analysis attack