quiz 11 Flashcards

1
Q

A(n) ____ is a transceiver that connects to a network via an Ethernet cable; it bridges the wireless LAN with the wired network.

A

access point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.

A

SSID
service set identifier
service set identifier (SSID)
SSID (service set identifier)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CSMA/CD is used at the data link layer on wireless networks.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Each frequency band contains ____; if they overlap, interference could occur.

A

channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

In 802.1X, what is an authentication server?

A

This server, which might be a Remote Access Dial-In User Service (RADIUS) server, is used as a centralized component that authenticates the user and performs accounting functions. For example, an ISP using RADIUS can verify who logged on to the ISP service and how long the user was connected. Most RADIUS servers are *nix based, but the Microsoft implementation of RADIUS is called Internet Authentication Service (IAS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

In 802.1X, a(n) ____ is the wireless user attempting access to a WLAN.

A

supplicant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

In 802.11, an addressable unit is called a ____.

A

station (STA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a WPAN, the maximum distance allowed between each device is usually ____ meters.

A

10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

In the 802.11 standard, a mobile station is defined as a station that accesses the LAN while moving; a(n) ____________________ station is one that can move from location to location, but is used only while in a

A

portable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

It’s possible to have a wireless network that doesn’t connect to a wired network

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

this technology is restricted to a single room or line of sight

A

infrared (IR)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

uses microwave radio band frequencies to transmit data

A

narrowband

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

data is spread across a large-frequency bandwidth instead of traveling across just one frequency band

A

spread spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

addresses the issue of wireless metropolitan area networks (MANs)

A

802.16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

addresses wireless MANs for mobile users who are sitting in trains, subways, or cars

A

802.20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

European WLAN standard

A

HiperLAN2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

uses GFSK modulation

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

uses DSSS modulation

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

defines the process of authenticating and authorizing users on a network

A

802.1X

20
Q

One of the default SSIDs used by D-Link is ____.

A

default

21
Q

The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the ____.

A

Data Link layer

22
Q

The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.

A

True

23
Q

The ____ band is used by commercial AM radio stations.

A

medium frequency (MF)

24
Q

The ____ standard, also referred to as Wi-Fi, operates in the 2.4 GHz range with an increased throughput from 1 or 2 Mbps to 11 Mbps.

A

802.11b

25
Q

The ____ standard has improvements to address the problem of interference.

A

802.11e

26
Q

The first wireless technology standard, ____________________, defined the specifications for wireless connectivity at 1 Mbps and 2 Mbps in a LAN.

A

802.11

27
Q

The default SSID used by Cisco is ____

A

Tsunami

28
Q

There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.

A

True

29
Q

WEP stands for ___________________

A

Wired Equivalent Privacy

30
Q

WPA improves encryption by using __

A

TKIP

31
Q

What are the basic components of a wireless network?

A

The basic components of a wireless network are:

  • Wireless network interface card (WNIC)
  • Access point (AP)
  • Wireless networking protocols
  • A portion of the RF spectrum
32
Q

What is WEP? Is it a good way to secure wireless networks

A

Wired Equivalent Privacy (WEP), part of the 802.11b standard, was developed to encrypt data traversing a wireless network. For some time, it gave many security professionals a false sense of security that wireless technology could be just as safe as wired networks. Unfortunately, WEP has been torn to shreds by security professionals, professors from major universities, and hackers who post ways to crack WEP encryption. Some argue that WEP is still better than no security at all, and when it’s combined with the security of a virtual private network (VPN), they claim that WEP works well for home users or small businesses. Still, many saw a need for a better way to protect WLANs.

33
Q

What is a certificate

A

A certificate is a record that authenticates network entities, such as a server or client. It contains X.509 information that identifies the owner, the certificate authority (CA), and the owner’s public key.

34
Q

What is frequency-hopping spread spectrum (FHSS)

A

Data hops to other frequencies to avoid any interference that might occur over a frequency band. This hopping from one frequency to another occurs at split-second intervals and makes it difficult for an intruder or attacker to jam the communication channel.

35
Q

What is the IEEE 802.15 standard?

A

The 802.15 standard addresses networking devices within one person’s workspace, which is called the wireless personal area network (WPAN). The maximum distance between devices is usually no more than 10 meters

36
Q

What is the function of a WG of the IEEE?

A

Working groups (WGs) of the IEEE are formed to develop new standards. After a WG has reached consensus on a proposal for a standard, the Sponsor Executive Committee must approve the proposal. Finally, after the proposal is recommended by the Standards Review Committee and approved by the IEEE Standards Board, you have a new standard.

37
Q

What is the role of a WNIC

A

For wireless technology to work, each node or computer must have a WNIC, which converts the radio waves it receives into digital signals the computer understands. There are many wireless NICs on the market, but be careful deciding which ones to purchase if you’re considering using specific tools for detecting APs and decrypting WEP keys, or using antennas that can cover a large distance.

38
Q

____ defines how data is placed on a carrier signal

A

Modulation

39
Q

____ Project 802 was developed to create LAN and WAN standards.

A

IEEE

40
Q

___ is a freeware tool written for Windows that enables you to detect WLANs using 802.11a, 802.11b, and 802.11g

A

NetStumbler

41
Q

___ is an enhancement to PPP

A

EAP

42
Q

____ is a product for conducting wardriving attacks written by Mike Kershaw. This product is free and runs on Linux, BSD, Mac OS X, and even Linux PDAs

A

Kismet

43
Q

___ is the most popular type of WLAN technology.

A

Spread spectrum

44
Q

___ is the tool most hackers wanting to access WEP-enabled WLANs use.

A

AirCrack NG

45
Q

___ uses TLS to authenticate the server to the client but not the client to the server.

A

PEAP

46
Q

___________________________ is specified in the 802.11i standard and corrected many security vulnerabilities in 802.11b.

A

WPA
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA)
WPA (Wi-Fi Protected Access)