Section 12 OBJ 2.3: Wireless Networks Flashcards

1
Q

Direct Sequence Spread Spectrum (DSSS)

A

Modulates data over an entire range of frequencies using a series of signals known as chips.
chips are susceptible to EMI and environmental interference. Not used often because of this
Uses entire frequency of spectrum to transmit, which is suboptimal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Frequency Hopping Spread Spectrum (FHSS)

A

Allows devices to hop between predetermined frequencies.
Slows down ability to use all the bandwidth and reduces spectrum available
least common of the three
Slows down network for better security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Orthogonal Frequency Division Multiplexing (OFDM)

A

Uses a slow modulation rate with simultaneous transmissions over 52 different data streams.
Most commonly used now.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

2.4 GHz

A

Has specific frequencies/channels to avoid overlap
Has 11 or 14 channels depending on regulations
Each channel is 20 MHz wide
Channels frequently overlap
Channels 1, 6, and 11 used to avoid overlap if using wireless B, G, N
US: 11 channels | 2401-2473 MHz
Rest of the world: 13 channels | 2401-2483 MHz
Japan: 14 channels | 2401-2495 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

5 GHz

A

Has specific frequencies/channels to avoid overlap
Has 24 non-overlapping channels
Each channel is 20 MHz wide
Has option to make wider networks through channel bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Channel Bonding

A

Wireless N networks and wireless AC
Allows for the creation of a wider channel by merging neighboring ones
Risk of overlapping because number of non overlapping channels is reduced
Wireless N: 40 MHz
Wireless AC: 80 MHz, 160 MHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Channel

A

a virtual medium through which wireless networks can send and receive data
basically a portion of the wireless frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Exam Important

A

Standard channel size for 2.4 GHz and 5 GHz is 20 MHz
Channel bonding with 5 GHz can make them larger, but risk interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

802.11a

A

Band: 5 GHz
Bandwidth: 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

802.11b

A

Band: 2.4 GHz
Bandwidth: 11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

802.11g

A

Band: 2.4 GHz
Bandwidth: 54 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

802.11n (Wi-Fi 4)

A

Band: 2.4 and 5 GHz
Bandwidth: 150 Mbps/600 Mbps (MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

802.11ac (Wi-Fi 5)

A

Band: 5 GHz
Bandwidth: 6.9 Gbps (MU-MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

802.11ax (Wi-Fi 6)

A

Band: 2.4, 5, and 6 GHz
Bandwidth: 9.6 Gbps (MU-MIMO)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Multiple Input and Multiple Output (MIMO)

A

uses multiple antennas the send and receive more data than it could with a single antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Multiple User Multiple Input and Multiple Output (MU-MIMO)

A

Allows multiple users to access the wireless network and access point at the same time

17
Q

Pre-Shared Key

A

Both the Access Point and client use the same encryption key
Like using same password on two devices
security is a concern, more so in large workplaces

18
Q

Wired Equivalent Privacy (WEP)

A

REMEMBER: Initialization Vector (IV)
Original 802.11 wireless security standard which is an INSECURE security protocol
uses a preshared key
uses a 24-bit initialization vector (IV) that can be cracked easily

19
Q

Wi-Fi Protected Access (WPA)

A

REMEMBER: TKIP and RC4
Replaced WEP and follows the Temporal Key Integrity Protocol (TKIP)
uses a 48-bit initialization vector
Rivest Cipher 4 (RC4) for encryption
Message Integrity Check (MIC) to confirm data not tampered with
Enterprise Mode to authenticate users before exchanging keys

20
Q

Wi-Fi Protected Access 2 (WPA2)

A

REMEMBER: AES and CCMP
created as part of IEEE 802.11i standard and requires stronger encryption and integrity checking through CCMP
Advanced Encryption Standard (AES) - to provide additional security by using a 128-bit key or higher

21
Q

MAC Address Filtering

A

configure the access point to only allow permitted MAC addresses, like an access control list

22
Q

Disable SSID Broadcast

A

minor security help by configuring the access point to not broadcast the SSID

23
Q

Wi-Fi (802.11)

A

creates point to point connections from one building to another over a relatively short distance
uses directional antennas

24
Q

Cellular

A

uses a larger antenna and hotspot powered by a power outlet inside an office or home

25
Q

Microwave

A

Creates point to point connection between two or more buildings that have longer distances

26
Q

Satellite

A

a long range and fixed wireless solution that can go for miles

27
Q

Near Field Communication (NFC)

A

Uses radio frequency to send electromagnetic charge containing the transaction data over a short distance

28
Q

Radio Frequency Identification (RFID)

A

A form of radio frequency transmission modified for use in authentication system
uses tags and readers

29
Q

Infrared Data (IrDA)

A

allows two devices to communicate using line of sight communication in the infrared spectrum

30
Q

Bluetooth

A

creates a personal area network over 2.4 GHz to allow for wireless connectivity

31
Q

Bluejacking

A

sending unsolicited messages to a bluetooth device

32
Q

Bluesnarfing

A

making unauthorized access to a bluetooth device

33
Q

BlueBorne

A

allows the attacker to gain complete control over a device without being connected to the target device