IS3120 CHAPTER 6 Flashcards
A server that provides authentication, authorization, and accounting for a network
AAA server
A system that uses a public key to encode data and a private key to decrypt data
Asymmetric encryption system
A WLAN network that includes an access point
Basic Service Set (BSS)
The number of nodes and the amount of shared bandwidth available to each node and coverage
Capacity
A modulation scheme defined in the IEEE 802.11b standard
Complementary code keying (CCK)
The attempt to provide the same level of signal strength to all network nodes.
Coverage
Application used to verify that the sender of a document, image, or message is a trusted source.
Digital signature
A modulation technique included in the IEEE 802.11x standard
Direct sequence spread spectrum (DSSS)
Adapts the nominal bit rate of a wireless node to better use a communication channel.
Dynamic rate shifting (DRS)
A WLAN that links together two BSS networks with a common linking device.
Extended Service Set (ESS)
An authentication method that is used in WLAMs and point-to-point connections
Extensible Authentication Protocol (EAP)
A peer-to-peer WLAN designation for each node in an ad hoc mode network.
Independent Basic Service Set (IBSS)
The 2.4 GHz bandwidth allocated to unlicensed use and used for 802.b/g/n
Industrial, scientific, and medical (ISM) bands
Cisco Systems’ version of EAP. It supports dynamic key encryption and mutual authentication
Lightweight Extensible Authentication Protocol (LEAP)
Prevents an attacker from intercepting, modifying, and retransmitting message packets by checking the integrity of a packet using the ICV.
Message integrity check (MIC)
The propagation that results in RF signals reaching the receiving antenna at different times and by two or more different paths.
Multipath
An antenna technology that uses multiple antennas (to receive and transmit) at both ends of a transmission.
Multiple-input and multiple-output (MIMO)
A process through which a node gains access to a wireless network running WEP and access rules that are not encrypted
Open System Authentication (OSA)
A frequency-division multiplexing (FDM) scheme that applies a digital multi-carrier modulation method
Orthogonal frequency division multiplexing (OFDM)
A technique that can modulated both analog and digital transmissions
Quadrature amplitude modulation(QAM)
A process through which a node gains access to a WLAN running the WEP protocol
Shared Key Authentication (SKA)
A system of encryption that applies the same exact key to encrypt and decrypt data
Symmetric encryption system
A security protocol used in the IEEE 802.11x wireless standard.
Temporal Key Integrity Protocol (TKIP)
The 5 GHz frequency band used by IEEE 802.11a devices
Unlicensed National Information Infrastructure (UNII)
A standard developed by the WiFi Alliance to certify protocols, software, and equipment standards
Wireless fidelity (WiFI)
- The network security standard for all IEEE networks is ___.
- IEEE 802.11a
- IEEE 802.11i
- IEEE 802.1x
- IEEE 802.3
IEEE 802.1x
- What did WPA add to improve on the WEP protocol?
- EAP
- EAPOL
- RC4
- TKIP
TKIP
- Which of the following security threats has the primary objective of overloading a network’s resources, resulting in the resources becoming unavailable to the network’s users?
- Denial of service
- Intrusion
- Interception
- ARP spoofing
Denial of service
- ___ is used to provide access to a network to users and networking devices.
- Authorization
- Accounting services
- Authentication
- Certification
Authentication
- A DoS attack is NOT a common security threat to a network.
TRUE OR FALSE
FALSE
- What type of protocol does the 802.1x standard prescribe for authentication?
- TKIP
- EAP
- AAA
- DRS
EAP
- The interference picked up by an RF antenna from other nearby transmitters is ___.
- EMI
- Metal box
- Crosstalk
- RFI
RFI
- The capability of a WLAN to support a certain number of wireless nodes is called its ___.
- Capacity
- Coverage
- Mode
- Site survey
Capacity
- What is the designation of a node in an ad hoc WLAN?
- ESS
- BSS
- IBSS
- SSID
IBSS
- What is the process used to verify the capability of a site or a space to support a WLAN called?
- Coverage
- Capacity
- Site survey
- Mode
Site survey
- What is the topology of a WLAN that includes only a single access point?
- BSS
- ESS
- IDSS
- RSSI
BSS
- What is the purpose of a site survey?
- To perform acceptance testing on a new WLAN installation
- To ensure that a WLAN design provides sufficient signal strength and bandwidth for all planned stationary or mobile nodes
- To ensure that each node on a WLAN is functioning properly
- To verify an existing WLAN meets the requirements for connecting to a wireless WAN
To ensure that a WLAN design provides sufficient signal strength and bandwidth for all planned stationary or mobile nodes
- The distance between a WLAN node and the AP to which it is associated determines the throughput the node experiences.
TRUE OR FALSE
TRUE
- What characteristic of the bandwidth of a WLAN is affected by the number of nodes associated with a particular access point?
- Bandwidth
- Login
- Security level
- Priority
Bandwidth
- Which of the following does not create a serious barrier to the transmission of RF signals?
- Concrete
- Leaded glass
- Open space
- Water
Open space