S11 - Wireless Networks Flashcards

1
Q

What is Direct-Sequence Spread Spectrum

A

Modulates data over an entire range of frequencies using a series of signals known as chips

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does DSSS stand for

A

Direct-Sequence Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Frequency-Hopping Spread Spectrum (FHSS) adv and dis?

A

Allows devices to hop between predetermined frequencies, good for security for for max bandwidth usage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does FHSS stand for

A

Frequency-Hopping Spread Spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Define Orthogonal Frequency Division Multiplexing (OFDM)

A

Uses a slow modulation rate with simultaneous transmissions over 52 different data stream

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does OFDM stand for

A

Orthogonal Frequency Division Multiplexing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does each band have to avoid overlapping with other signals

A

Each band has specific frequencies/channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define channel

A

A virtual medium through which wireless networks can send and receive data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How many channels does 2.4Ghz have

A

11(US) or 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What channels do you need to use to avoid frequency overlapping in 2.4GHZ

A

1, 6 and 11 (b,g,n)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How many non-overlapping channels does 5GHz have

A

24

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define channel bonding

A

Allows for the creation of a wider channel by merging neighbouring channels into one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name a danger of channel bonding

A

Allows for a higher chance of interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the standard MHz for both 2.4Ghz and 5GHz

A

20 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define Multiple-Input and Multiple-Output (MIMO)

A

Uses multiple antennas to send and receive data than it could with just a single antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does MIMO stand for

A

Multiple-Input and Multiple-Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

function of Multiple User Multiple Input Multiple Output (MU-MIMO)

A

Allows multiple users to access the wireless network and access point at the same time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What does MU-MIMO stand for

A

Multiple Uses Multiple Input Multiple Output

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Define Radio Frequency Interference (RFI)

A

Occurs when there are similar frequencies to wireless networks in the area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does RFI stand for

A

Radio Frequency Interference

21
Q

What is a recommendation when it comes to large environments

A

Not using Pre-shared keys

22
Q

Define Wired Equivalent Privacy (WEP), what bit does it use for encryption

A

Originally 802.11 wireless security standard which is an insecure security protocol, (Initialisation vectors)24

23
Q

Define Wi-Fi Protected Access (WPA), what bit does it use for encryption

A

Replaced WEP and follows the Temporal Key Integrity Protocol (TKIP) & RC4, 48

24
Q

Function of Message Integrity Check (MIC)

A

Confirms data was not modified in transmit

25
Q

Function of Enterprise Mode in WPA

A

Authenticates users before exchanging keys

26
Q

Define Wi-Fi Protected Access 2 (WPA2)

A

Created as part of IEEE 802.11i standard and requires stronger encryption and integrity checking through AES & CCMP

27
Q

Function of Advanced Encryption Standard (AES)

A

Provides additional security by using a 128-bit key or higher

28
Q

What does personal mode refer to

A

Pre-shared key

29
Q

What does enterprise mode refer to

A

Centralised authentication

30
Q

Define Mac Address Filtering

A

Configure an access point with a listing of permitted MAC addresses (like an ACL)

31
Q

What does SSID stand for

A

Server Set Identifier, name of router being broadcasted

32
Q

What is Wi-Fi (802.11) used for

A

Creates point to point connections from one building to another over a relatively short distance

33
Q

Define Cellular

A

Uses a large antenna and a larger hotspot powered by a power outlet with an office or home

34
Q

Define Microwave

A

Creates point to point connection between 2 or more buildings that have longer distances (longer than Wi-Fi)

35
Q

Traditional microwave link distance

A

40 miles-ish

36
Q

Define Satellite connections

A

A long range and fixed wireless solution that can go for miles

37
Q

Disadvantage of low earth orbit connection

A

Requires more satellites to cover the entire plant but gives lower latency speeds

38
Q

Adv & dis of geosynchronous orbit

A

One satellite can cover a large portion of the earth, higher latency and lower quality

39
Q

What are the 4 connection categories

A

Wi-Fi (802.11), Cellular, Microwave, Satellite

40
Q

Define Near Field Communication (NFC)

A

Uses radio frequency to send electromagnetic charge containing the transaction data over a short distance (few inches)

41
Q

Radio Frequency Identification (RFID)

A

A form of radio frequency transmission modified for use in authentication systems

42
Q

Define Infrared Data (IrDA)

A

Allows 2 devices to communicate using line of high communication in the infrared spectrum

43
Q

Bluetooth function

A

Creates a personal area network over 2.4GHz to allow for wireless connectivity

44
Q

Bluejacking Definition

A

Sending unsolicited messages to a Bluetooth device

45
Q

Bluesnarfing definition

A

Making unauthorised access to a device via Bluetooth connection

46
Q

Define BlueBorne

A

Allows the attacker to gain complete control over a device without even being connected to the target device

47
Q

Define Tethering

A

Sharing cellular data internet connection from a smartphone to multiple other devices

48
Q

What is the main recommendation for security with Wi-Fi networks

A

Only connect to TRUSTED networks