6.3 - Wireless Ethernet Flashcards

1
Q

______________ (commonly called Wi-Fi) is the commercial name for a set of standards developed by the IEEE 802.11 standards group

A

Wireless Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The 802.11 family of technologies is much like the Ethernet family — they reuse many of the Ethernet ________ components and are designed to connect easily into Ethernet LANs

A

802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Logical and physical topologies of WiFi are the same as those of hub-based Ethernet: a __________ and a __________

A

physical star…logical bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Media access control in WiFi is ______________________________

A

Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Before a computer can transmit in a WLAN, it must first establish an ______________ with a specific AP, so that AP will accept its transmission

A

association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All types of WiFi are ____________________

A

backwards compatible

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Six types of WiFi:

A
  1. 802.11a
  2. 802.11b
  3. 802.11g
  4. 802.11n
  5. 802.11ac
  6. 802.11ad
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Under perfect conditions, it provides 8 channels of 54 Mbps, each with a maximum range of 50 meters or 150 feet

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Under perfect conditions, it provides 3 channels of 11Mbps, each with a maximum range of 150 meters or 450 feet

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Under perfect conditions, it provides 3 channels of 54 Mbps, each with a maximum range of 150 meters or 450 feet

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Under perfect conditions, it provides 3 channels of 450 Mbps, each with a maximum range of 100 meters or 300 feet

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The channels used for 802.11n are __, __, and ___ — designed such that channels do not overlap and cause interference with each other

A

1…6…11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

For 802.11n, it is also possible to configure a __________ so it combines all the channels into one “dual-band” channel that provides 600 Mbps

A

dual-band AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

IEEE _________ is another obsolete version, but many organizations continue to use it because it is cheap

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This version runs on two different frequency spectrums: 2.4 and 5 GHz

A

802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

One important innovation in 802.11ac is the the ____________________ (RTS/CTS) media access control is sent on a separate frequency range, so that it doesn’t interfere with data transmission

A

Request to Sent/Clear to Send

17
Q

Default modulation technique for 802.11ac is __________, increased from 64-QAM in 802.11n

18
Q

Sometimes called WiGig and is a specialized version of wireless Ethernet that has a maximum range of 10 meters (30 feet)

19
Q

Current products of 802.11ad have data rates of __________

20
Q

WLANs you discover, with the intent of helping you break into them. This type of wireless reconnaissance is often called __________

A

wardriving

21
Q

With _______, the AP requires the user to have a key to communicate with it — all data sent to and from the AP are encrypted

A

Wired Equivalent Privacy (WEP)

22
Q

WEP security has a number of weaknesses; it is like using a __________

23
Q

With _________, every frame is encrypted using a key

A

WiFi Protected Access (WPA)

24
Q

The difference is that the WPA key is __________ than the WEP key and thus, harder to break

25
The newest, most secure type of WLAN security --- user logs in to a login server to obtain the master key
802.11i (WPA2)
26
802.11i uses the ____________________ (AES) as its encryption method
Advanced Encryption Standard
27
With ____________________, the AP permits the owner to provide a list of MAC addresses
MAC address filtering