T3 - Wireless networking Flashcards

1
Q

Bluetooth

A
  • is a wireless method of connecting devices together over a short distance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bluetooth

A

uses radio waves at 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pairing -

A

A persistent link is made between the two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

passkey

A

in order to pair to it
- gives a layer of security like a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Passkeys only need to be entered ..

A

once and will be remembered by devices that are paired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wireless transmission

A
  • uses radio waves for communication
    Susceptible to interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless NICs

A
  • Built into every networked device capable of connecting to a wireless network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless Access Point (WAP) -

A

device
that allows wireless devices to connect to
a wired network using Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

usually connects to a router via a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption:

A

encoding of data so that it can no longer be easily understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Plaintext

A

: the original message to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ciphertext:

A

the encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption: the process of

A

converting plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key:

A

a sequence of numbers used to encrypt or decrypt, often data using a mathematical formula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption algorithm:

A

the formula for encrypting the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption techniques:

A

-private key
-public key

17
Q

Private key

A

(Symmetric encryption):
A single key is used to encrypt and decrypt a message
must be given to the recipient of your message to decrypt the data

18
Q

Public key

A

(Asymmetric encryption):
Two keys are used - one (public key) to encrypt and the other (private key) to decrypt data
more secure = never have to send or reveal your decryption key

19
Q

Caesar shift cipher:

A

earliest known substitution cipher
symmetric encryption
-most basic type + the most insecure
- Letters of the alphabet are shifted by a given number

20
Q

Caesar shift cipher: process

A

Each letter is replaced by a letter n positions further on in the alphabet
n is the key and is used to encrypt and decrypt the message

21
Q

Symmetric encryption:

A

Same key used to encrypt and decrypt a message

22
Q

Public key (Asymmetric) encryption:

A

Two keys are used: a public key known to everyone for encrypting and a private key for decrypting

23
Q

Interception in wifi/ethernet

A

Wi-Fi signal can be listened to from a distance
Ethernet and fibre optic cables can also be intercepted

24
Q

Wireless encryption: eg

A

Examples = WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access)
The WEP method of encryption is older and less secure
HTTPS should be used for websites as it encrypts data sent to and received from the site

25
Strong encryption
= useful lifetime of the encrypted data is less than the time taken to break the code.
26
Weak encryption,
the code may be broken in time to use the information, but it wouldn’t be worth the effort trying
27
2.4GHz pros
Greater range and coverage
28
2.4GHz cons
More interference from other devices as this is a crowded frequency
29
5GHz pros
Less crowded space with 23 non-overlapping channels with higher data transmission rates
30
5GHz cons
Less able to penetrate through walls