CompTIA A+ Core 1: Wireless Networking & Services Flashcards

1
Q

Describe 802.11a standard

A

Bandwidth up too 54 Mbps
operates in 5GHz frequency range
Less effective penetrating solid objects
Also referred to as Wi-Fi 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Describe 802.11b standard

A

Bandwidth up to 11Mbps
2.4ghz frequency
Susceptible to interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe 802.11g standard

A
Emerged in 2002
Draws from 802.11a and 802.11b
Bandwidth up to 54Mbps
2.4Ghz frequency
backward compatible with 802.11b
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe 802.11n standard

A

Wireless N
Multiple signals and antennas
Better range
Backward compatible with 802.11b/g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe 802.11ac standard

A
improved bandwidth
Wider channels
Beamforming
Dual-band transmission
No backward compatibility
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Describe 802.11ax standard

A
Dual-band wireless
Bandwidth up to 10Gbps 
2.4/5Ghz
Lower power consumption
Better range
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Describe 2.4Ghz frequencies

A

Better penetration of solid objects
Greater coverage area than 5Ghz
Susceptible to interference
Lower data rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Describe 5Ghz frequencies

A

Higher data rate
Less susceptible to interference
Smaller coverage area
Less successful penetrating solid objects

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Describe 2.4Ghz channels

A

Fourteen channels defined for use
depending on the country, not all channels are allowed
Each channel is 20MHz wide
Requires some of the channels overlap with each other
Channels 1,6 and 11 are good channels for typical implmentaitoosn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Describe 5Ghz channels

A
Wider variety of channels for the 5GHz band
Channels begin at 36
more regulated than 2,4Ghz hand
Less susceptible to interference
fewer devices use these channels
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Pros of Bluetooth

A

Low power consumption
Relatively secure
Versatility
Developer-friendly platform

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Cons of Bluetooth

A

Connection issues

Devices can be inconsistent during the pairing process, possibly from interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Describe Long-range fixed wireless access

A

Connects two fixed locations
Enable data communications
Alternative to installing cables between sites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe Long-range fixed wireless info

A

Point-to-point configurations
Does not require satellites
Connect users in remote areas

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Considerations for using long-range fixed wireless

A

Geography
Licensing
Antennas
Power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are factors affecting long range fixed wireless

A

Geographical interference
2.4Ghz interference
Tidal fading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Features of NFC (Near field communication)

A
Contactless communication
Common in smartphones and tablets
Devices exchange data automatically
Limited range
Devices must be close
Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Pros of NFC

A

Convenient
Seamless
Broad support
No pairing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Cons of NFC

A

Cost

Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Describe features of RFID(Radio frequency identification)

A
Embedded chip and antenna
Tracking
Automatic identification and data capture(AIDC)
Tags and readers
Active/Passive
Various applications
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

RFID Pros

A

Global standard
Multiple items
Speed
No line of sight required

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

RFID Cons

A

Scanning issues

Security

23
Q

Features of DNS

A

Convert names to IP addresses
Distributed naming system
Usually managed by the ISP or enterprise IT department

24
Q

Describe DHCP process

A

Ip address configuration
alternative to static configuration
automated IP addressing

25
Describe print servers
Manage print requests Provide printer queue information large enterprise networks small office or home networks
26
Describe mail servers
Microsoft exchange IBM Lotus/Domino Open-source
27
Describe web servers
Client/server model | Deliver content over Hypertext transfer Protocol (HTTP)
28
Name common web servers
Apache Internet information Services (IIS) NGINX
29
Describe file servers
Client/server model Central storage and file management Files can be accessed by computers on same network
30
Describe syslog server role
Network devices send messages to logging server | Most network devices can send Syslog messages
31
Name components of the AAA framework
Authentication Authorization Accounting(accountability)
32
Describe authentication
Process of determining whether someone or something is true, genuine or valid Most commonly a username and password
33
Describe Authorization
Occurs after authentication Access system resources and perform tasks Policy enforcmnet Individual permisssions Authenticated users may be granted access to different activities
34
Describe Accounting
``` Monitor resources accessed by users Session logging Billing Usage analysis Control of authorization Planning ```
35
Describe Multi-Factor authentication
Security token Biometric verification Security questions
36
Describe UTM(Unified Threat Management)
Firewall Proxy server Anti-virus/anti spam Content filter
37
Describe IDS(Intrusion detection system)
``` Network based (NIDS) Hot based (HIDS) ```
38
Describe IPS(Intrusion prevention system)
Network security/threat prevention Detect vulnerability exploits Prevent vulnerability exploits
39
Describe Load balancers
Traffic distribution Increase capacity Improve application reliability
40
Describe proxy servers
``` Access server on behalf of client Caching, filtering, security Can also be caching servers Dedicated caching servers Can filter content ```
41
Describe Legacy systems
``` Old, outdated, unsupported systems Networks can be a mix of old and new hardware/software Expensive to maintain Run proprietary software May require specialised programming ```
42
What are potential issues with Legacy Systems
Compatibility Integration with modern systems Compliance
43
Migrating data from legacy systems
Extraction Transformation and cleansing Validation Transferring to new system
44
Describe Supervisory Control and Data Aquistion(SCADA)
Collects and analyses real-time data | Monitoring and controlling operations
45
Describe SCADA Applications
Local or remote control Monitor, gather and process real-time data Device interaction Record events
46
Describe SCADA Systems
Master Terminal Unit(MTU) Remote Terminal Unit(RTU) Human Machine Interface(HMI)
47
SCADA Pros
``` Information reliability and accuracy Real-time notifications Trend analysis Proactive maintance Increased equipment lifespan Informed decisions ```
48
SCADA Cons
``` Initial investment is significant Adaption to new system Training on new technology Suppourt after purchase Maintenance time costs ```
49
Describe Internet of Things(IoT)
Non-traditional internet devices From the very small to the very large collect and transmit data
50
How IoT works
Sensors Communications chips Collect and transmit data IoT gateways
51
Common IoT devices
``` Light switches and outlets Thermostats Televisions Refrigerators Smart watches or health monitors ```
52
Examples of Use cases for IoT
Manufacturing Transportation Agriculture Healthcare
53
Benefits of IoT
Lifestyle Buisness insights Automation