Section 11: Wireless Networks Flashcards

1
Q

WiFi IEEE Standard

A

802.11 (Standard for Local Area Networks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AdHoc Mode

A

▪ Wireless devices communicate directly with each other without the need for a centralized access point
▪ Peer-to-Peer connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Infrastructure Mode

A

▪ Wireless devices communicate with other wireless or wired devices through a wireless router or access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AP or WAP

A

Access Point or Wireless Access Point (Layer 1)
▪ Extends wired LAN into the wireless domain
● Does not interconnect two networks (not a router)
● Functions as a hub
▪ Connects wired LAN and wireless devices into the same subnet
▪ All clients on an access point are on a single collision and broadcast domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Router

A

▪ Gateway device and base station for wireless devices to communicate with each other and connect to the Internet
▪ Often combines many features into one device:
● Wireless Access Point (WAP or AP)
● Router
● Switch
● Firewall
● Fiber, Cable, or DSL modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

WLAN IBSS

A

Independent Service Set - No access points. AdHoc Mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WLAN BSS

A

Basic Service Set - Only one AP connected to the network. (Infrastructure Mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

WLAN ESS

A

Extended Service Set - Multiple APs connected to network. (Also Infrastructure Mode.) (Same Wirless Network Name)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Wireless Mesh Topology

A

▪ May not use a centralized control
▪ Uses WiFi, Microwave, Cellular, and more

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Spread Spectrum Wireless Transmission Terms to know for exam

A

▪ Direct-Sequence Spread Spectrum (DSSS)
▪ Frequency-Hopping Spread Spectrum (FHSS)
▪ Orthogonal Frequency-Division Multiplexing (OFDM)
▪ Only DSS and OFDM are commonly utilized in today’s WLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which 2.4 GHz channels avoid overlapping frequencies for b/g/n networks?

A

1, 6 and 11 (Provides enough separation to keep 20MHz of use and fit within the 72MHz of allowable spectrum.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the 5GHz spectrum feature that allows for combining channels?

A

Channel Bonding
▪ Allows you to create a wider channel by merging neighboring channels into one

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

802.11a: Operating band / max bandwidth?

A

5 GHz / 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11b: Operating band / max bandwidth?

A

2.4 GHz / 11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

802.11g: Operating band / max bandwidth?

A

2.4 GHz / 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

802.11n: Operating band / max bandwidth?

A

2.4 and 5 GHz / 150 Mbps and 600 Mbps (MIMO)
(aka Wi-Fi 4)

17
Q

802.11ac: Operating band / max bandwidth?

A

5 GHz / 3 Gbps (MU-MIMO)
(aka Wi-Fi 5)

18
Q

802.11ax: Operating band / max bandwidth?

A

2.4, 5, and 6 GHz / 9.6 Gbps (MU-MIMO)
(aka Wi-Fi 6)

19
Q

Wireless Security: Four things to know for exam.

A

Open = No security/protection
WEP = Initialization Vector (The flaw with WEP, Weak)
WPA = TKIP (Replaced the initialization vectors) and RC4 (Encryption - Weak)
WPA2 = CCMP-(Integrity Protocol); AES-(Encryption Mechanism)

20
Q

EAP

A

Extensible Authentication Protocol - Authentication using 802.1x (3 Modes)
▪ EAP-FAST - Flexible Authentication via Secure Tunneling
▪ EAP-MD5
▪ EAP-TLS

21
Q

MAC Filtering

A

For exam considered a reasonable security measure. Not so much in the real world.

22
Q

NAC

A

Network Access Control - Permits/denies access based on devices characteristics.
▪ Checks the OS and antivirus version of client

23
Q

Captive Portal

A

▪ Web page that appears before the user is able to access the network resources
▪ Webpage accepts the credentials of the user and presents them to the authentication server

24
Q

Geofencing

A

▪ GPS or RFID defines boundaries which can be active or passive
▪ Device can send alerts if it leaves area
▪ Network authentication can use it to determine access

25
Q

Disable SSID Broadcast

A

Server Set Identifier
▪ Configures an AP to not broadcast the name of the wireless LAN
(Minor security feature because it can be easily determined. But, can be a layer when using other security features.)

26
Q

Rogue Access Point

A

▪ Malicious users set up an AP to lure legitimate users to connect
▪ Can then capture all the packets (data) going through the rogue access point