CCNA 1.11, 2.6, 5.9-.10 - Wireless Flashcards
Describe the bands and max data rate of 802.11-1997.
2.4GHz, 2Mbps
Describe the bands and max data rate of 802.11b.
2.4GHz, 11Mbps
Describe the bands and max data rate of 802.11g.
2.4GHz, 54Mbps
Describe the bands and max data rate of 802.11a.
5GHz, 54Mbps
Describe the bands and max data rate of 802.11n.
2.4 or 5GHz, 600Mbps
Describe the bands and max data rate of 802.11ac.
5GHz, 6.93Gbps
Describe the bands and max data rate of 802.11ax.
2.4 or 5Ghz, ~28Gbps
What is an IBSS?
An Independent Basic Service Set is aka an “ad hoc” network between two wireless devices, and does not require an AP or BSS.
Which channels in the 2.4GHz band are non-overlapping?
1, 6, and 11
Which channels in the 5 GHz band are non-overlapping?
All of them are non-overlapping
By default, the BSSID is based on…
The AP’s MAC address
In an Extended Service Set, APs will share an _____ but have different ______.
SSID (e.g. “CorpNet”), BSSIDs (MAC address based identifiers)
Which frequency has a farther reach, 2.4 or 5GHz?
2.4GHz
MIC stands for
Message Integrity Check
TKIP is used for ______ and has been deprecated and replaced by _____ and ______.
1) privacy and integrity
2) CCMP
3) GCMP
Although deprecated, TKIP can still be used in ____.
WPA
What data encryption and integrity protocol is used in WPA2?
CCMP
A pre-shared key is used in what two wifi configurations?
WPA2 personal and WPA3 personal
WEP keys can be ____ or ____ bits long.
40 or 104
What is Cisco’s proprietary authentication, meant to replace WEP but has been largely deprecated?
LEAP (Lightweight EAP)
Two authentication methods which use an “inner” and “outer” authentication are:
1) EAP-FAST
2) PEAP
EAP-TLS improves upon PEAP by…
Requiring both the authentication server (AS) and each user to have a digital certificate
What early encryption/integrity method has been deprecated?
TKIP
CCMP is used in _____; GCMP is used in _____.
WPA2, WPA3
What are the authentication/encryption methods used in WPA, WPA2, and WPA3?
1) TKIP
2) AES CCMP
3) AES GCMP
What is 802.1x?
An authentication method used by all instances of WPA. 802.1x is the opposite of using a pre-shared key.
An SSID can contain up to ___ characters.
32
True or false: an SSID is case-sensitive.
True
What does CAPWAP stand for, and in what architecture is it used?
Control and Provisioning of Wireless Access Points, used in Split-MAC architectures.
APs in a Split-MAC architecture are referred to as ______ APs.
Lightweight
What transport-layer ports are used for CAPWAP tunnels?
Control: UDP 5246
Data: UDP 5247
A centralized WLC can support up to ______ lightweight APs.
6000
If a WLC is in a public cloud, what mode must the APs operate in?
FlexConnect mode
If a WLC is connected to the core of a network, this is referred to as ____
Centralized WLC deployment
If a WLC is located in the distribution layer of a network, this is referred to as _____
distributed WLC deployment
Distributed WLCs can handle how many APs?
250
If a WLC is co-located with a group of APs at a branch site, this is referred to as ______
Embedded WLC deployment or controllerless wireless deployment - the WLC function is hosted on an AP itself
An embedded WLC can support how many APs?
100
What are the five types of WLC deployments?
Cloud, centralized, distributed, embedded, or autonomous (none).
What are the two sub-modes of FlexConnect mode?
connected or standalone
What are the eight AP modes available?
Local
Monitor
FlexConnect
Sniffer
Rogue detector
Bridge
Flex+Bridge
SE-Connect
Let My Fucking Sniffer Run By Fast, Sir!
What do CCMP and GCMP do?
Provide privacy and integrity
The IOS-XE wireless controller works at layer ____ while the AireOS controller works at layer ___.
2, 3
Wireless controllers can support how many WLANs?
512
An AP can support how many WLANs?
16
How frequently are beacons sent from APs?
Every 100ms
From a design perspective, the maximum number of WLANs on a single AP should be limited to ___
5, or 3 would be best