Chapter 4: Wireless LAN Flashcards
What is Wireless Personal-Area Networks (WPAN) ?
4.1.1.3
Operates in the range of a few feet. Bluetooth or Wi-Fi Direct-enabled devices are used in WPANs.
What Operates in the range of a few feet. Bluetooth or Wi-Fi Direct-enabled devices are used in WPANs.
Operates in the range of a few hundred feet such as in a room, home, office, and even campus environment.
What is Wireless Wide-Area Networks (WWANs)
4.1.1.3
Operates in the range of miles such as a metropolitan area, cellular hierarchy, or even on intercity links through microwave relays.
What is IEEE number for bluetooth?
4.1.1.3
802.15
ses a device-pairing process to communicate over distances up to .05 mile (100m).
What is IEEE number for wifi?
4.1.1.3
802.11
include data, voice and video traffic, to distances up to 300m (0.18 mile).
What is IEEE number for wimax?
4.1.1.3
802.16
provides wireless broadband access of up to 30 miles (50 km)
What year was the 2G Mobile Network introduced
4.1.1.3
1991
What year was the 3G Mobile Network introduced
4.1.1.3
2001
What year was the 4G Mobile Network introduced
4.1.1.3
2006
What is the IEEE Number for 2.4 GHz (UHF)
4.1.1.4
802.11b/g/n/ad
What is the IEEE Number for 5 GHz (UHF)
4.1.1.4
802.11a/n/ac/ad
What is the IEEE Number for 60 GHz (UHF)
4.1.1.4
802.11ad
What is the speed and frequency for 802.11
4.1.1.5
2MB/s and 2.4 GHz
What is the speed and frequency for 802.11a
4.1.1.5
54MB/s and 5 GHz
What is the speed and frequency for 802.11b
4.1.1.5
11MB/s and 2.4 GHz
What is the speed and frequency for 802.11g
4.1.1.5
54MB/s and 2.4 GHz
Backward Compatible 802.11b
What is the speed and frequency for 802.11n
4.1.1.5
600MB/s and 2.4 GHz and 5 GHz
Backward Compatible 802.11a/b/g
What is the speed and frequency for 802.11ac
4.1.1.5
1.3GB/s and 5 GHz
Backward Compatible 802.11 a/n
What is the speed and frequency for 802.11ad
4.1.1.5
7 GB/s 2.4GHz, 5GHz, 60GHz
Backward Compatible 802.11 a/b/g/n/ac
what is an Autonomous APs
4.1.2.4
Autonomous APs, sometimes referred to as heavy APs, are standalone devices configured using the Cisco CLI or a GUI. Autonomous APs are useful in situations where only a couple of APs are required in the network
What is Controller-Based APs
Controller-based APs are server-dependent devices that require no initial configuration. Cisco offers two controller-based solutions.
What is Omnidirectional Wi-Fi Antenna
4.1.2.8
Omnidirectional antennas provide 360-degree coverage and are ideal in open office areas, hallways, conference rooms, and outside areas.
What is Directional Wi-Fi Antennas
4.1.2.8
Directional antennas focus the radio signal in a given direction. This enhances the signal to and from the AP in the direction
What is Yagi antennas
4.1.2.8
Type of directional radio antenna that can be used for long-distance Wi-Fi networking. These antennas are typically used to extend the range of outdoor hotspots in a specific direction, or to reach an outbuilding.
What is Ad hoc mode
4.1.3.1
When two devices connect wirelessly without the aid of an infrastructure device, such as a wireless router or AP
What is Infrastructure mode?
4.1.3.1
When wireless clients interconnect via a wireless router or AP, such as in WLANs
What is Basic Service Set (BSS)?
4.1.3.3
A BSS consists of a single AP interconnecting all associated wireless clients.
What is the Frame Structure Consists of
4.2.1.1
Header, Payload, FCS
What is the three [3] stages of the Wireless Access?
4.2.2.2
- Discover new wireless AP.
- Authenticate with AP.
- Associate with AP.
What is Passive Mode?
4.2.2.4
The AP openly advertises its service by periodically sending broadcast beacon frames containing the SSID, supported standards, and security settings.
What is Active Mode?
Wireless clients must know the name of the SSID. The wireless client initiates the process by broadcasting a probe request frame on multiple channels.
What is a A spoofed disconnect attack?
4.3.1.3
his occurs when an attacker sends a series of “disassociate” commands to all wireless clients within a BSS. These commands cause all clients to disconnect.
What is a A CTS flood?
4.3.1.3
This occurs when an attacker takes advantage of the CSMA/CA contention method to monopolize the bandwidth and deny all other wireless clients access to the AP.
What is a rogue AP?
4.3.1.4
Connected to a corporate network without explicit authorization and against corporate policy
or
Connected or enabled by an attacker to capture client data such as the MAC addresses of clients (both wireless and wired),
How do you prevent rogue APs,
4.3.1.4
organizations must use monitoring software to actively monitor the radio spectrum for unauthorized APs
What is evil twin AP” attack
an attacker introduces a rogue AP and configures it with the same SSID as a legitimate AP. Locations offering free Wi-Fi, such as airports, cafes, and restaurants, are hotbeds for this type of attack due to the open authentication.
What is SSID cloaking?
4.3.2.1
APs and some wireless routers allow the SSID beacon frame to be disabled. Wireless clients must manually identify the SSID to connect to the network.
What is Temporal Key Integrity Protocol (TKIP)
4.3.2.3
encryption method used by WPA. It provides support for legacy WLAN equipment by addressing the original flaws associated with the 802.11 WEP encryption method
Advanced Encryption Standard (AES)
4.3.2.3
AES is the encryption method used by WPA2. It is the preferred method because it aligns with the industry standard IEEE 802.11i