T3 - Wireless networking Flashcards

1
Q

Bluetooth

A
  • is a wireless method of connecting devices together over a short distance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

bluetooth

A

uses radio waves at 2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Pairing -

A

A persistent link is made between the two devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

passkey

A

in order to pair to it
- gives a layer of security like a password

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Passkeys only need to be entered ..

A

once and will be remembered by devices that are paired

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Wireless transmission

A
  • uses radio waves for communication
    Susceptible to interference
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Wireless NICs

A
  • Built into every networked device capable of connecting to a wireless network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless Access Point (WAP) -

A

device
that allows wireless devices to connect to
a wired network using Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AP

A

usually connects to a router via a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Encryption:

A

encoding of data so that it can no longer be easily understood

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Plaintext

A

: the original message to be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ciphertext:

A

the encrypted message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption: the process of

A

converting plaintext into ciphertext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Key:

A

a sequence of numbers used to encrypt or decrypt, often data using a mathematical formula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Encryption algorithm:

A

the formula for encrypting the plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Encryption techniques:

A

-private key
-public key

17
Q

Private key

A

(Symmetric encryption):
A single key is used to encrypt and decrypt a message
must be given to the recipient of your message to decrypt the data

18
Q

Public key

A

(Asymmetric encryption):
Two keys are used - one (public key) to encrypt and the other (private key) to decrypt data
more secure = never have to send or reveal your decryption key

19
Q

Caesar shift cipher:

A

earliest known substitution cipher
symmetric encryption
-most basic type + the most insecure
- Letters of the alphabet are shifted by a given number

20
Q

Caesar shift cipher: process

A

Each letter is replaced by a letter n positions further on in the alphabet
n is the key and is used to encrypt and decrypt the message

21
Q

Symmetric encryption:

A

Same key used to encrypt and decrypt a message

22
Q

Public key (Asymmetric) encryption:

A

Two keys are used: a public key known to everyone for encrypting and a private key for decrypting

23
Q

Interception in wifi/ethernet

A

Wi-Fi signal can be listened to from a distance
Ethernet and fibre optic cables can also be intercepted

24
Q

Wireless encryption: eg

A

Examples = WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access)
The WEP method of encryption is older and less secure
HTTPS should be used for websites as it encrypts data sent to and received from the site

25
Q

Strong encryption

A

= useful lifetime of the encrypted data is less than the time taken to break the code.

26
Q

Weak encryption,

A

the code may be broken in time to use the information, but it wouldn’t be worth the effort trying

27
Q

2.4GHz pros

A

Greater range and coverage

28
Q

2.4GHz cons

A

More interference from other devices as this is a crowded frequency

29
Q

5GHz pros

A

Less crowded space with 23 non-overlapping channels with higher data transmission rates

30
Q

5GHz cons

A

Less able to penetrate through walls