Vol 1 Part 8: Fundamentals of Wireless Networks Flashcards

1
Q

What is the standard that wireless devices must adhere to?

A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Access Points operate in what mode, and what does this mode offer?

A

Infrastructure mode. It offers services necessary to form the infrastructure of a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a basic service set?

A

The collection of devices that can communicate with each other in your wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the Service Set Identifier (SSID)?

A

The name of the wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the basic service set identifier (BSSID)

?

A

The BSS ambassador (your access point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Membership with the BSS is called a what?

A

An association

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What must a host device send to the access point in order to join the basic service set?

A

An association request

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The 802.11 standard refers to upstream wired ethernet as the BLANK for the wireless basic service set.

A

Distribution system (DS). This is essentially the connection that interconnects the wireless to the wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The AP is in charge of mapping a BLANK to a BLANK

A

a VLAN to an SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an extended service set (ESS)?

A

Multiple APs that cover different geographic locations that are all interconnected by a switched structure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

With respect to a wireless network, what is roaming?

A

The concept of moving to a different AP within the ESS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is an independent basic service set (IBSS)?

A

Two or more wireless clients that can communicate directly with each other without the need for an access point. This is also known as an Ad-Hoc network, and is impromptu, scaling poorly after 8 to 10 devices are on the IBSS.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is a repeater, what happens to signal that flows through a repeater, and how has this issue been remedied?

A

A repeater is configured to relay signal coverage to another area, useful when trying to get coverage to an area where the AP cannot reach. Throughput is halved when using a repeater, as the channel is now twice as long. To remedy this, some repeaters have multiple transceivers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a workgroup bridge (WGB)?

A

An adapter used to bring in a device that only supports a wired connection into a wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the two types of WGBs and what do they do?

A

Universal workgroup bridge (uWGB)- it allows a single wired device to be bridged
Cisco Workgroup Bridge- a cisco proprietary variant that allows multiple wired devices to connect to a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a mesh network in regards to a wireless network?

A

A mesh of access points that leverage dual radios, with one channel in range of one frequency and another channel in range of a different range of frequencies. The BSS is on one channel, and the client traffic is bridge from AP to AP, kindof like RETRANS!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What are the two frequencies utilized by wireless networks?

A

2.4Ghz and 5 Ghz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A range of frequencies is known as a what?

A

A band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What channels are used in wireless networks in order to avoid overlap?

A

1, 6, and 11

20
Q

What are the pros and cons of the 2.4Ghz band vs the 5Ghz band?

A

2.4 has better range and barrier penetration

5 has more channels, meaning less overlap, and is faster, but has less range and less barrier penetration

21
Q

Which wireless standard has very high throughput and does not use the 2.4 Ghz range?

A

802.11ac

22
Q

Autonomous Access Points can have multiple BLANK residing in different BLANK

A

SSIDs residing in different VLANs

23
Q

Cisco Meraki is a cloud based software that allows a network engineer to do what?

A

Manage the wireless, switched, and security networks through report generation, AP management, performance monitoring, and more.

24
Q

Cisco Meraki will instruct APs to make changes if BLANK or BLANK is detected

A

interference or rogue access points

25
Q

When functions of an AP are divided, the AP becomes a BLANK

A

A lightweight access point that only performs real-time functions

26
Q

What is a wireless LAN controller (WLC)?

A

A device used to control the management functions on a wireless network

27
Q

When the access points and a wireless LAN controller are implemented in order to divide labor on the network, the network is referred to as a BLANK

A

a split-MAC architecture network

28
Q

The AP and WLC use this protocol in a split-MAC network

A

Control and Provisioning of Wireless Access Points Tunneling Protocol (CAPWAP)

29
Q

CAPWAP has two separate tunnels. What are they, and what do they do?

A

CAPWAP Control Messages- carries exchanges to configure APs and manage it. This tunnel is authenticated and encrypted for security, forcing the AP to only communicate with the appropriate WLC
CAPWAP Data- sends packets to and from wireless clients on the access point. This data is not encrypted by default, and can be encrypted using Datagram Transport Layer Security (DTLS).

30
Q

Each AP must BLANK with the WLC using BLANK

A

Authenticate with the WLC using digital certificates

31
Q

Placing the WLC in a central location is referred to as BLANK or BLANK

A

unified or centralized WLC deployment

32
Q

Placing the WLC in a central position in a data center in a private cloud is known as BLANK

A

cloud-based WLC deployment

33
Q

What is meant by open authentication in regards to a wireless client?

A

No credentials are needed to join the network. Think of a Wi-Fi hotspot at Starbucks.

34
Q

WEP uses what kind of encryption? Why is WEP considered weak?

A

RC4 cipher encryption. It is weak because the key used to encrypt and decrypt is the same and it is shared between the sender and receiver ahead of time.

35
Q

802.1x, also known as the Extensible Authentication Protocol (EAP) does what in regards to authentication on a wireless network?

A

It requires a dedicated server used for authentication, usually a Radius server, that takes the client (supplicant) and the authenticator (network device giving access) and compares the credentials of the client based on its database.

36
Q

In a WLAN, the WLC becomes an authenticator/middle man. What are the 4 methods of authentication in this configuration?

A
  1. LEAP
  2. EAP-FAST
  3. PEAP
  4. EAP-TLS (most secure and utilizes a public key infrastructure)
37
Q

What is the temporal key integrity protocol (TKIP)?

A

A security protocal that authenticates using a message integrity check (MIC), time stamps, the client’s MAC address, and a key mixing algorithm.

38
Q

What kind of encryption does the Counter/Chain Block Cipher-MAC protocol (CCMP) use, what are it’s advantages over TKIP, and what kind of security is this protocol used with?

A

CCMP uses AES counter mode encryption, allowing it to be more secure than TKIP. CCMP is used with WPA2.

39
Q

What kind of encryption does Galois/Counter Mode Protocol (GCMP) use and what kind of security is this protocol used with?

A

GCMP uses AES counter mode encryption. GCMP is used in WPA3.

40
Q

How do you configure a management IP on a Cisco Wireless LAN controller?

A
  1. Console Connection
  2. Web based GUI on HTTP/HTTPS
  3. SSH

REMEMBER! Authentication on a WLC can be either local or AAA!

41
Q

What is Link Aggregation Group (LAG)?

A

EtherChannel for WLCs.

42
Q

What are the 4 types of ports on a WLC?

A
  1. Service
  2. Distribution
  3. Console
  4. Redundancy
43
Q

What is the management interface used for on a WLC?

A

Normal management traffic such as user authentication and the termination of CAPWAP tunnels.

44
Q

What is the virtual interface used for on a WLC?

A

IP address facing wireless clients when the controller is relating client DHCP, authenticating, and roaming

45
Q

What is a service Port Interface used for on a WLC?

A

Out of Band Management

46
Q

What is the dynamic interface used for on a WLC?

A

To connect a VLAN to a WLAN

47
Q

What are the 7 steps to configuring a WLAN?

A
  1. Define the WLAN on the WLC
  2. Set up a RADIUS server for AAA
  3. Create a dynamic interface
  4. Pick your security types
  5. Configure your Quality of Service settings
  6. Advanced WLAN settings as needed
  7. Finalizing the WLAN configuration