Chapter 4: Wireless LAN Flashcards

1
Q

What is Wireless Personal-Area Networks (WPAN) ?

4.1.1.3

A

Operates in the range of a few feet. Bluetooth or Wi-Fi Direct-enabled devices are used in WPANs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Operates in the range of a few feet. Bluetooth or Wi-Fi Direct-enabled devices are used in WPANs.

A

Operates in the range of a few hundred feet such as in a room, home, office, and even campus environment.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Wireless Wide-Area Networks (WWANs)

4.1.1.3

A

Operates in the range of miles such as a metropolitan area, cellular hierarchy, or even on intercity links through microwave relays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is IEEE number for bluetooth?

4.1.1.3

A

802.15

ses a device-pairing process to communicate over distances up to .05 mile (100m).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is IEEE number for wifi?

4.1.1.3

A

802.11

include data, voice and video traffic, to distances up to 300m (0.18 mile).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is IEEE number for wimax?

4.1.1.3

A

802.16

provides wireless broadband access of up to 30 miles (50 km)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What year was the 2G Mobile Network introduced

4.1.1.3

A

1991

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What year was the 3G Mobile Network introduced

4.1.1.3

A

2001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What year was the 4G Mobile Network introduced

4.1.1.3

A

2006

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the IEEE Number for 2.4 GHz (UHF)

4.1.1.4

A

802.11b/g/n/ad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the IEEE Number for 5 GHz (UHF)

4.1.1.4

A

802.11a/n/ac/ad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the IEEE Number for 60 GHz (UHF)

4.1.1.4

A

802.11ad

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the speed and frequency for 802.11

4.1.1.5

A

2MB/s and 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the speed and frequency for 802.11a

4.1.1.5

A

54MB/s and 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the speed and frequency for 802.11b

4.1.1.5

A

11MB/s and 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the speed and frequency for 802.11g

4.1.1.5

A

54MB/s and 2.4 GHz

Backward Compatible 802.11b

17
Q

What is the speed and frequency for 802.11n

4.1.1.5

A

600MB/s and 2.4 GHz and 5 GHz

Backward Compatible 802.11a/b/g

18
Q

What is the speed and frequency for 802.11ac

4.1.1.5

A

1.3GB/s and 5 GHz

Backward Compatible 802.11 a/n

19
Q

What is the speed and frequency for 802.11ad

4.1.1.5

A

7 GB/s 2.4GHz, 5GHz, 60GHz

Backward Compatible 802.11 a/b/g/n/ac

20
Q

what is an Autonomous APs

4.1.2.4

A

Autonomous APs, sometimes referred to as heavy APs, are standalone devices configured using the Cisco CLI or a GUI. Autonomous APs are useful in situations where only a couple of APs are required in the network

21
Q

What is Controller-Based APs

A

Controller-based APs are server-dependent devices that require no initial configuration. Cisco offers two controller-based solutions.

22
Q

What is Omnidirectional Wi-Fi Antenna

4.1.2.8

A

Omnidirectional antennas provide 360-degree coverage and are ideal in open office areas, hallways, conference rooms, and outside areas.

23
Q

What is Directional Wi-Fi Antennas

4.1.2.8

A

Directional antennas focus the radio signal in a given direction. This enhances the signal to and from the AP in the direction

24
Q

What is Yagi antennas

4.1.2.8

A

Type of directional radio antenna that can be used for long-distance Wi-Fi networking. These antennas are typically used to extend the range of outdoor hotspots in a specific direction, or to reach an outbuilding.

25
Q

What is Ad hoc mode

4.1.3.1

A

When two devices connect wirelessly without the aid of an infrastructure device, such as a wireless router or AP

26
Q

What is Infrastructure mode?

4.1.3.1

A

When wireless clients interconnect via a wireless router or AP, such as in WLANs

27
Q

What is Basic Service Set (BSS)?

4.1.3.3

A

A BSS consists of a single AP interconnecting all associated wireless clients.

28
Q

What is the Frame Structure Consists of

4.2.1.1

A

Header, Payload, FCS

29
Q

What is the three [3] stages of the Wireless Access?

4.2.2.2

A
  1. Discover new wireless AP.
  2. Authenticate with AP.
  3. Associate with AP.
30
Q

What is Passive Mode?

4.2.2.4

A

The AP openly advertises its service by periodically sending broadcast beacon frames containing the SSID, supported standards, and security settings.

31
Q

What is Active Mode?

A

Wireless clients must know the name of the SSID. The wireless client initiates the process by broadcasting a probe request frame on multiple channels.

32
Q

What is a A spoofed disconnect attack?

4.3.1.3

A

his occurs when an attacker sends a series of “disassociate” commands to all wireless clients within a BSS. These commands cause all clients to disconnect.

33
Q

What is a A CTS flood?

4.3.1.3

A

This occurs when an attacker takes advantage of the CSMA/CA contention method to monopolize the bandwidth and deny all other wireless clients access to the AP.

34
Q

What is a rogue AP?

4.3.1.4

A

Connected to a corporate network without explicit authorization and against corporate policy
or
Connected or enabled by an attacker to capture client data such as the MAC addresses of clients (both wireless and wired),

35
Q

How do you prevent rogue APs,

4.3.1.4

A

organizations must use monitoring software to actively monitor the radio spectrum for unauthorized APs

36
Q

What is evil twin AP” attack

A

an attacker introduces a rogue AP and configures it with the same SSID as a legitimate AP. Locations offering free Wi-Fi, such as airports, cafes, and restaurants, are hotbeds for this type of attack due to the open authentication.

37
Q

What is SSID cloaking?

4.3.2.1

A

APs and some wireless routers allow the SSID beacon frame to be disabled. Wireless clients must manually identify the SSID to connect to the network.

38
Q

What is Temporal Key Integrity Protocol (TKIP)

4.3.2.3

A

encryption method used by WPA. It provides support for legacy WLAN equipment by addressing the original flaws associated with the 802.11 WEP encryption method

39
Q

Advanced Encryption Standard (AES)

4.3.2.3

A

AES is the encryption method used by WPA2. It is the preferred method because it aligns with the industry standard IEEE 802.11i