SOHO Routers Flashcards
(SOHO routers) SOHO routers, which stands for _____ ______ ____ ______ ______.
Small, Office, Home, Office, router
(SOHO routers) These are your common inexpensive routers that are used in _____ and small __________.
homes, businesses
(SOHO routers) These are fairly easy to set up, but if you don’t configure the router correctly, you will not have access to the _______.
network
(SOHO routers) - To set up and configure your SOHO router, you need to go into the router’s built-in _____________ web page.
- Just open up a web browser and in the address field, type in the _______ IP address.
- For example, our router has an IP address of 192.168.2.1. Once you type that in, press enter on your keyboard, and now you’re in.
configuration, router’s
(WEP) _____ __________ _______ (WEP) is one of the security protocols used for wireless networks.
Wired, Equivalent, Privacy
(WEP) As its name implies, it’s meant to supply the same security to ________ networks as it did for _____ networks.
wireless, wired
(WEP) After time, it was found out that the 40-bit encryption key that WEP used was not ______ and it was easily ________.
secure, hackable
(WPA) WPA (____ _________ ______) is another wireless security protocol that was developed to solve the security problems of WEP.
WIFI, Protected, Access
(WPA) WPA is far better than WEP in two ways.
- First, it uses a stronger encryption method using TKIP (________ ___ _________ ________), which dynamically changes keys as it’s being used.
- This ensures data integrity. And secondly, WPA uses EAP (__________ ______________ ________), which verifies authorized network users.
Temporal, Key, Integrity, Protocol, Extensible, Authentication, Protocol
(WPA2) Building on the security of WPA, WPA2 was developed to provide even stronger ________ than WPA. And it does this by requiring the use of a stronger wireless __________ method.
security, encryption
(WPA2) While WPA uses TKIP for encryption, which has known to have some limitations, WPA2 uses CCMP (_______ ____ with ______ _____ ________ _______ ______________ ____ ________) for encryption.
Counter, Mode, Cipher, Block, Chaining, Message, Authentication, Code, Protocol
(WPA2) CCMP is more secure because it uses an enhanced ____ c____________ e____________ m________.
data, cryptographic, encapsulation, mechanism
(WPA2) since 2006, WPA2 is available on all certified __-__ ________.
WIFI, Hardware
(WPS) WPS stands for __-__ _________ _____, and this security protocol was designed for users who know little about wireless networks to make it as ____ as possible for them to join a secure wireless network.
WIFI, Protected, Setup, easy
(WPS) here’s an example of a WPS configuration page for our router. And as you can see, there are three different ___ _______ that you can use to join this wireless network. (PT.1)
WPS, methods
(WPS) You could use method one if your client has a __-__ _________ _____ button.
You would just press that button, then within two minutes, you would press the WPS button here on this page. Or you can just press the ________ WPS button on the router itself, and then you’ll be connected. (PT.2)
WIFI, Protected, Setup, physical
(WPS) You can also use method two if your client has a ___ PIN number.
You would just enter that number in here and press register. (PT.3)
WPS
(WPS) you can use method three if your client asks for the router’s ___ number, and you would just enter this number into your device, and then you’ll be connected. (PT.4)
PIN
(WPS) WPS is the easiest way to join a ________ _______, and a lot of manufacturers are building their wireless products with WPS to make it as simple as possible for their customers to join their ______ to a wireless network.
wireless, network, device
(MAC Filter) Another wireless security feature is the ___ ______.
MAC, filter