CH14 - Course Quiz Flashcards
The nodes that connect ad hoc in an IBSS randomly generate a ______________ string of number sthat looks and functions just like a MAC address?
64-byte
48-bit
48-byte
64-bit
48-bit
Which concept defines the most basic infrastructure mode network: a BSS of one WAP and one or more wireless clients?
extended service set (ESS)
basic service set (BSS)
basic service set identifier (BSSID)
independent basic service set (IBSS)
basic service set identifier (BSSID)
Which element did the WIFI developers create to use as another level of naming to apply to the BSS or IBSS to help the connection happen?
link state
supplicant
mode
service set identifier (SSID)
service set identifier (SSID)
Which type of unit is formed by a single wireless access point servicing a given area that has been extended by adding more access points?
basic service set (BSS)
basic service set identifier (BSSID)
extended service set (ESS)
independent basic service set (IBSS)
extended service set (ESS)
A Wireless Access Point (WAP) that can only be configured by a Wireless Controller is called a thick client?
True
False
False
Leightweight EAP (LEAP) is a proprietary EAP authentication used almost exclusively by Cisco Wireless Products?
True
False
True
_________ broadcasts data in small, discrete chunks over the different frequencies available within a certain frequency range?
Transmit beamforming
CSMA/CD
Channel Bonding
Spread-Spectrum
Spread-Spectrum
One of the big challenges to larger enterprise networks is the large number of clients that might be on a single ___________ at any given moment?
MAC Address
SSID
NIC
Router
SSID (Service Set Identifier)
Which Wireless Bridge can only communicate with a single other bridge and is used to connect two wireless network segments?
point-to-point
point-to-multipoint
omnidirectional
dipole
point-to-point
Which setting should be modified when there are overlapping WIFI signals?
channel and frequency
signal and link state
beacon and interframe gap
MAC address and NIC address
channel and frequency
Which term describes a method that enables an administrator to limit access to a network based on the physical address of Wireless NICs?
MAC Address Filtering
WEP
WPA
802.1X
MAC Address FIltering
Many wireless access points (WAPs) have removable device antennas?
True
False
True
Which term describes a portion of the available spectrum for WIFI network communications?
interframe space
frequency
channel
frame
channel
Whitelisting and blacklisting are labor-intensive processes, with whitelisting requiring far more work?
True
False
True
The _____________ standard established the baseline features common to all subsequent WIFI standards?
- 11
- 3
- 4
- 16
802.11
Provide examples of NON-WIFI source of RF interference. Explain why they are a problem to wireless networks and how to correct the problem?
It can come from natural phenomena like lightning and sun spots to a diverse of man-made sources like:
AM/FM Radio and TV Transmitters
Mobile Phones
Bluetooth SYstems
Microwaves
…among many others
The only way to eliminate this type of interference is to shut down or move the devices.
Briefly define the goodput of a wireless network and the concepts behind this factor?
Goodput is used to describe the number of packets that are exchanged between the applications that use the Network.
Commonly known as Throughput, measures the number of packets exchanged over the network to determine network efficiency.
Goodput is also described as measuring the Throughput at the Application Level.
Describe Channel Bonding?
Enables devices to use 2 channels for transmission to increase throughput.
Describe infrastructure mode as it pertains to wireless networking?
Uses a WAP (Wireless Access Point) that acts as a hub for all wireless clients.
Describe ad hoc mode as it pertains to wireless networking?
Two or more devices communicate Directly without any other intermediary hardware.
When an antenna strengthens and focuses the radio frequency (RF) output from a WAP, the ratio of increase is called __________?
gain
The process whereby nonmetallic building materials such as brick, sheetrock, and wood absorb radio signals, greatly reducing or in some cases eliminating a WIFI signal completely, is called ____________?
absorption
The IEEE ____________ standard defines both how wireless devices communicate and how to secure that communication?
802.11
_____________ is the current 802.11 collision avoidance method that specifies rules for sending data onto the network media?
Distributed Coordination Function (DCF)
We measure RFI with the _______________, essentially comparing the signal strength and the overall interference in the space?
signal-to-noise-ratio (SNR)
Which term describes the predetermined silence period that is added to the length of the current frame to determine the waiting period for a network device after it has detected traffic on the media?
wait time
PCF
link state
interframe gap
interframe gap (IFG)
What happens when frames are transmitted on the network from two different devices at the same time, corrupting each other’s signals?
Interframe space expands
A collision occurs.
A channeling error occurs.
Transmit beamforming occurs.
A collision occurs.
Which technology enables WAPs to receive their power from the same Ethernet cables that transfer their data?
Power over Ethernet (PoE)
VLAN pooling
near-field communication (NFC)
mobile device management (MDM)
Power over Ethernet (PoE)
MAC Filtering with a blacklist means an administrator allows only specific computers to JOIN the Network?
True
False
False
Explanation:
Blacklist = When you deny specific computers.
Whitelist = When you allow only specific computers to join the Network.
The Point Coordination Function (PCF) is the currently implemented wireless collision avoidance system?
True
False
False
Explanation:
It’s DCF = Distributed Coordiantion Function
Which Wi-Fi standard offers speeds of up to 54 Mbps, offers a range of up to about 300 feet, operates in the 2.4-GHz frequency, and is backward-compatible with an earlier, popular Wi-Fi standard?
- 11g
- 11b
- 11a
- 11n
802.11g
With an omnidirectional antenna, the radio wave flows outward from the wireless access (WAP) in one direction?
True
False
False
Explanation:
Omnidirectional is in ALL Directions.
Which term represents a measurement of how well a wireless device is connecting to other devices?
signal strength
access
mode
link state
signal strength
Describe what an Admin must do to configure encryption in a Wireless Network?
- Selects an Authentication Method. (Always use the strongest Encryption you can.)
- Create a Strong Password
- Configure all connected Wireless Clients on the Network
What is the FULL name for the acronym RADIUS?
Remote Authentication Dial-In User Service
Describe a Rogue Access Point (AP)?
An unauthorized Access Point, most Rogue APs aren’t Evil and may have been setup by mistake, but some are Evil.
Discuss why using the 5 GHz range for Wireless Networking produces less interference than the 2.4 GHz range?
Because more devices operate at 2.4 GHz Frequencies and tend to step all over each other and is much much more crowded than 5 GHz.
Define Service Set Identifier (SSID)?
It’s the Network Name and is a 32 bit identification string that’s inserted into the header of each frame processed by a WAP.
Parabolic, dish, and Yagi are all examples of ____________ antennas?
unidirectional (ONE Direction)
Explanation:
Omnidirectional (ALL Directions)
The standard straight-wire antennas that provide the most omnidirectional function are called _____________ antennas?
dipole
A __________________ is a Rogue AP that intentionally mimics an existing SSID in order to get people to connect to it instead of the proper WAP?
Evil Twin
In _____________ mode, the 802.11n WAP sends out separate packets just for legacy devices?
Legacy
One of the big challenges to larger enterprise Networks is the large number of clients that might be on a single _____________ at any given moment?
MAC Address
NIC
Router
SSID
SSID (Service Set Identifier)
Which wireless bridge can talk to more than one other bridge at a time and can connect multiple network segments?
omnidirectional
dipole
point-to-point
point-to-multipoint
point-to-multipoint
Which standard includes Secure Authentication using RADIUS server and password encryption using EAP?
WPA
WEP
IEEE 802.1X
MAC Address Filtering
IEEE 802.1X
A Word Document that stops loading or an online file that stops downloading are examples of ___________?
latency
attenuation
absorption
reflection
latency
What type of unit is formed by two or more wireless nodes communicating in ad hoc mode?
basic service set identifier (BSSID)
basic service set (BSS)
extended service set (ESS)
independent basic service set (IBSS)
independent basic service set (IBSS)
WAPs use an Access Control List (ACL) to enable or deny specific MAC Addresses?
True
False
True
Describe 802.1X and explain what was used before 802.1X and the issue associated with it?
802.1X is a Port-based Authentication Network Access Control mechanism for Networks.
Before 802.1X, a system on a Wired Network could always access another system’s Port, an attacker wouldn’t be able to do much until he gave a username and password or certificate, but he could still send packets to another computer on the same Network.
What is the trade-off an Admin must consider when modifying the beacon interval on a WAP?
You can adjust the rate of the beacon traffic down - and improve your Network traffic speeds, but you lower the speed at which devices can negotiate to get on the Network, amont other things.
What two pieces of software are needed by every wireless Network Adapter to function with an operating system?
- Device Driver to talk to the Wireless NIC
2. Configuration Utility to configure it.
Explain why the omnidirectional and centered approach does not work for every network?
3 Reasons
- If the signal exceeds the size of the Network Space, the signal bleeds out.
- If your Network Space exceeds the signal of your WAP, you’ll need to get some sort of signal booster.
- Any obstacles will produce glaring Dead Spots in the Network Coverage.
Every WIFI Network communicates on a _____________, a portion of the spectrum available?
channel
The 802.11n specification requires all but handheld devices to use multiple antennas to implement a feature called ____________________, which enables the devices to make multiple simultaneous connections called streams?
Multiple Input/Multiple Output (MIMO)
Explanation:
- 11n
- 11ac
Before installing a WIFI Network, be sure to do a ____________ to locate any obstacles that need to be overcome to determine the best location for your Access Points?
site survey
Many 802.11n WAPs employ, a multiple-antenna technology that helps get rid of ____________ - places where the radio signal just does not penetrate at all - or atleast make them not so bad?
dead spots
Aside from the SSID, broadcast traffic includes the _____________, essentially a timing frame sent from the WAP at regular intervals?
beacon
Wireless Devices can Listen and Send at the same time?
True
False
False
Explanation:
Wireless runs at Half Duplex where Wired runs at Full Duplex.
Which term describes a graphical representation of the Radio Frequency (RF) sources on a Site?
Heat Map
Which encryption standard uses AES 128-bit block that is much tougher to crack than 128 bit TKIP RC4 Wrapper?
WPA2
Explanation:
WPA = TKIP/PSK
WPA2 = AES/PSK