SOHO Routers Flashcards

1
Q

(SOHO routers) SOHO routers, which stands for _____ ______ ____ ______ ______.

A

Small, Office, Home, Office, router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

(SOHO routers) These are your common inexpensive routers that are used in _____ and small __________.

A

homes, businesses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

(SOHO routers) These are fairly easy to set up, but if you don’t configure the router correctly, you will not have access to the _______.

A

network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

(SOHO routers) - To set up and configure your SOHO router, you need to go into the router’s built-in _____________ web page.
- Just open up a web browser and in the address field, type in the _______ IP address.
- For example, our router has an IP address of 192.168.2.1. Once you type that in, press enter on your keyboard, and now you’re in.

A

configuration, router’s

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

(WEP) _____ __________ _______ (WEP) is one of the security protocols used for wireless networks.

A

Wired, Equivalent, Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

(WEP) As its name implies, it’s meant to supply the same security to ________ networks as it did for _____ networks.

A

wireless, wired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

(WEP) After time, it was found out that the 40-bit encryption key that WEP used was not ______ and it was easily ________.

A

secure, hackable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

(WPA) WPA (____ _________ ______) is another wireless security protocol that was developed to solve the security problems of WEP.

A

WIFI, Protected, Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

(WPA) WPA is far better than WEP in two ways.
- First, it uses a stronger encryption method using TKIP (________ ___ _________ ________), which dynamically changes keys as it’s being used.
- This ensures data integrity. And secondly, WPA uses EAP (__________ ______________ ________), which verifies authorized network users.

A

Temporal, Key, Integrity, Protocol, Extensible, Authentication, Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

(WPA2) Building on the security of WPA, WPA2 was developed to provide even stronger ________ than WPA. And it does this by requiring the use of a stronger wireless __________ method.

A

security, encryption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

(WPA2) While WPA uses TKIP for encryption, which has known to have some limitations, WPA2 uses CCMP (_______ ____ with ______ _____ ________ _______ ______________ ____ ________) for encryption.

A

Counter, Mode, Cipher, Block, Chaining, Message, Authentication, Code, Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

(WPA2) CCMP is more secure because it uses an enhanced ____ c____________ e____________ m________.

A

data, cryptographic, encapsulation, mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

(WPA2) since 2006, WPA2 is available on all certified __-__ ________.

A

WIFI, Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

(WPS) WPS stands for __-__ _________ _____, and this security protocol was designed for users who know little about wireless networks to make it as ____ as possible for them to join a secure wireless network.

A

WIFI, Protected, Setup, easy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(WPS) here’s an example of a WPS configuration page for our router. And as you can see, there are three different ___ _______ that you can use to join this wireless network. (PT.1)

A

WPS, methods

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

(WPS) You could use method one if your client has a __-__ _________ _____ button.
You would just press that button, then within two minutes, you would press the WPS button here on this page. Or you can just press the ________ WPS button on the router itself, and then you’ll be connected. (PT.2)

A

WIFI, Protected, Setup, physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

(WPS) You can also use method two if your client has a ___ PIN number.
You would just enter that number in here and press register. (PT.3)

A

WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(WPS) you can use method three if your client asks for the router’s ___ number, and you would just enter this number into your device, and then you’ll be connected. (PT.4)

A

PIN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

(WPS) WPS is the easiest way to join a ________ _______, and a lot of manufacturers are building their wireless products with WPS to make it as simple as possible for their customers to join their ______ to a wireless network.

A

wireless, network, device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

(MAC Filter) Another wireless security feature is the ___ ______.

A

MAC, filter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

(MAC Filter) Every ________ adapter has a MAC address.

A

wireless

22
Q

(MAC Filter) A MAC address is a ___________ number that uniquely identifies each ______ on a network.

A

hexadecimal, device

23
Q

(MAC Filter) With a MAC filter, you can either prevent or ______ access by using the device’s ___ _______.
In this example, once we enable the MAC filter, we can choose the option to prevent devices that are listed below from accessing the wireless network.

A

permit, MAC, Address

24
Q

(MAC Filter) So, all of these devices listed here are now blocked from joining the _______.
Alternatively, we can choose the permit option, and this will allow only the devices listed below access to the network.

A

network

25
Q

(DMZ) DMZ stands for?

A

Demilitarized Zone

26
Q

(DMZ) The DMZ allows a designated computer on your network to be fully _______ to the internet.
It does this by the router forwarding all _____ at the ____ time to the designated ___ computer.

A

exposed, ports, same, DMZ

27
Q

(DMZ) While the computers on our internal LAN are protected ______ the firewall, the DMZ computer is _______ the firewall and is not _________.

A

inside, outside, protected

28
Q

(DMZ) The DMZ is typically used for _______ ________. So, if you set up a computer that you want to be accessed from the internet and you’re having trouble configuring the firewall and applications, you can simply bypass all ________ ________ and put the computer in the DMZ temporarily to ensure everything is working until you can pinpoint the _______ you are having, such as a firewall setting.

A

testing, purposes, firewall, security, problem

29
Q

(DMZ) It’s also important to note that the DMZ computer must be assigned a ______ __ _______ and not automatically from a DHCP server.

A

static, IP, address

30
Q

(Port Forwarding) Another option on the configuration page is ____ forwarding.

A

port

31
Q

(Port Forwarding) On this page, you can customize ____ services for certain ____________.

A

port, applications

32
Q

(Port Forwarding) When a user sends these types of requests to your network from the internet, the router will _______ those requests to the appropriate ________.

A

forward, computer

33
Q

(Port Forwarding) For example, let’s say a friend of yours wants to access one of your computers in your home network using RDP (Remote Desktop Protocol), and as you know from an earlier lesson, RDP services use port 3389.
When your friend starts up their RDP service on their computer, they put in the public IP address of your router. Once that request hits your router, your router needs to know which computer on your network to forward that request to, so your friend can access the correct computer. That’s where port forwarding comes in. (PT.1)

A

example

34
Q

(Port Forwarding) On the port forwarding configuration page, you have to forward the RDP port to the correct computer. You type in the RDP port number, which is 3389, and then you have to point it to the IP address of the computer that you want your friend to access, which is 192.168.2.3.
Once that’s done, the router knows where to forward that request, and the connection is now complete. (PT.2)

A

example

35
Q

(Guest Network) A feature that’s built into most wireless routers is called a _____ _______.

A

guest, network

36
Q

A guest network is a ________ wireless network that’s built into a wireless router that your ______ can join so they can have access to the ________.

A

separate, guests, internet

37
Q

The guest network will have its own SSID, and it’s typically the same name as your ____ _______ SSID but may have a minus “guest” suffix added to the ____.

A

main, network, SSID

38
Q

(Wireless Security) Here, you can choose to disable security and have your network wide open, or you can choose to secure your network with one of these security modes.

A

example

39
Q

(Wireless Security) If you click on the wireless security section, you can configure the _______ of your wireless network.

A

security

40
Q

(Channel Wireless Settings) if you are experiencing any connectivity issues to your wireless router, there might be interference with another nearby ________ _______ that’s operating on the same _______ as yours. In this case, you can try changing to a different channel and see if it solves your problem.

A

wireless, network, channel

41
Q

(Channel Wireless Settings) Channels are used to avoid ____________ with other wireless networks nearby.

A

interference

42
Q

(SSID) example, when a wireless laptop scans for wireless networks to join in the vicinity of this router, the laptop will see the router’s ____ broadcast called “My Wireless.”
And if it has the proper credentials, it can join the network

A

SSID

43
Q

(SSID) The SSID is ____________, and you can call it whatever you want.

A

customizable

44
Q

(SSID) You can set the SSID, which stands for _______ ___ __________, which is basically the name of your wireless network.

A

Service, Set, Identifier

45
Q

(SOHO routers) a DHCP server automatically assigns an __ _______ to each computer on your network, because all computers need an ip address to function on a _______.

A

IP, address, network

46
Q

(SOHO routers) By default, the DHCP server is enabled (on configuration page), but if you want to, you can disable the DHCP server by pressing the button provided and then saving your settings.

A

example

46
Q

(SSID) The SSID is shared among all ________ _______ in your network.

A

wireless, devices

46
Q

(SOHO routers) (configuration page) for a Cisco SOHO router.
This is where you would set up the router with custom ________ to make it work for your particular _______.

A

settings, network

47
Q

(SSID) also on the router’s web page there are the wireless settings, now when here you can configure the wireless settings for your network for example, On the router’s web page, there are the wireless settings. Here, you can configure the wireless settings for your network.

A

example

47
Q

(Channel Wireless Settings) Also, in here, you can set the channel for your ________ network.

A

wireless