Wireless Networking Flashcards

1
Q

Which 802.11 standard operates in the 2.4 GHz frequency range?

A

802.11b, 802.11g, and 802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which 802.11 standard operates in the 5 GHz frequency range?

A

802.11a, 802.11n, and 802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the maximum speed for the 802.11a standard?

A

54 Mpbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the maximum speed for the 802.11b standard?

A

11 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the maximum speed for the 802.11g standard?

A

54 Mpbs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the maximum speed for the 802.11n standard?

A

600 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the maximum speed for the 802.11ac standard?

A

1.3 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The 802.11g standard is backwards compatible with which standard(s)?

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The 802.11n standard is backwards compatible with which standard(s)?

A

802.11 a/b/g (depending on implementation)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The 802.11ac standard is backwards compatible with which standard(s)?

A

802.11 b/g/n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What technique increases bandwidth by using multiple antennas for both transmitter and receiver?

A

MIMO (Multiple-Input, Multiple-Output)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What technique increases bandwidth by using multiple antennas for both transmitter and receiver, but allows 8 radio streams instead of 4?

A

MU-MIMO (Multi-User Multiple-Input, Multiple-Output)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Networking can use radio waves as a communication medium. These network types are called ______ networks.

A

wireless, or Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which wireless network mode has no central connection point and instead connects hosts directly to each other using a wireless interface card?

A

Ad-hoc mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which wireless network mode connects to a central connecting device called a wireless access point (AP) and uses the AP to connect hosts to each other?

A

Infrastructure mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The ______ controls communication between devices and also bridges the wireless network with a wired network.

A

wireless access point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The _____ is configured to the wireless access point and is used to identify a wireless network. It helps differentiate the access point from the other access points and is used when configuring wireless devices.

A

SSID (Service Set Identifier)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What specification (from IEEE) is used to define the standards and characteristics of wireless networks?

A

802.11 specification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Wireless networks broadcast a specific number of signals. Newer wireless networks use ______ to combine multiple channels into on, increasing bandwidth and communication speeds.

A

channel bonding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

______ is the process of proving identity.

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which authentication method uses MAC address filtering to permit or deny connections?

A

Open authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

______ is when all MAC addresses are denied access to a wireless network by default, and only MAC addresses on the allowed list are able to connect.

A

Implicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

______ is when all MAC addresses are allowed by default, and a list is used to deny specific MAC addresses.

A

Explicit deny

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Open authentication can be easily bypassed using what?

A

MAC address spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which authentication method asks for a password before connecting to the wireless network?

A

Shared key authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which authentication method asks for a username and password and then sends to an authentication server?

A

802.1x authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which encryption method uses RC4 to encrypt and decrypt communications, can be used with open or shared key authentication, and is considered a very unsecure method?

A

WEP (Wired Equivalent Privacy)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which encryption method uses TKIP protocol, where a different encryption key is used for every packet being sent?

A

WPA (Wi-Fi Protected Access)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which encryption method uses AES, and is the default encryption used by most wireless APs?

A

WPA2 or 802.11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the new authentication launched in 2018 that uses password authentication, protects against password guessing using SAE (Simultaneous Authetication of Equals), and offers 192-bit crytographic strength?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

______ is a communication technology that uses light waves to transmit information through the air.

A

Infrared (IR)

32
Q

Which infrared mode sends infrared light out in a broad wave, has a range of a couple meters, and doesn’t require a direct line of sigh to the receiver?

A

diffuse or scatter mode IR

33
Q

Which infrared mode uses a narrow beam of infrared light, cant have any obstructions, has a range of 1 meter, and requires devices be lined up appropriately?

A

line of sight (LOS) IR

34
Q

______ is a short-range wireless communication technology that uses radio waves that operate between 2.4 and 2.485 GHz and has a range of about 30 feet?

A

Bluetooth

35
Q

Bluetooth devices communicate using a _______, which is similar to an ad hoc wireless network. You have a master device, and all other devices, called slaves, connect to this.

A

personal area network (PAN)

36
Q

______ wireless communication technology uses 13.56 MHz frequency and has 2 inch range. Capable devices use small chips that can store data, and are able to send and receive information using radio signals.

A

near field communication (NFC)

37
Q

When sending sensitive information, ______ is able to use encryption algorithms to secure the connection.

A

near field communication (NFC)

38
Q

Which Bluetooth version(s) transmits at 1 Mbps?

A

version 1.2

39
Q

Which Bluetooth version(s) transmits at 3 Mbps?

A

version 2.0

40
Q

Which Bluetooth version(s) transmits at 24 Mbps?

A

version 3.0 and 4.0

41
Q

Which Bluetooth class(es) have a max distance of 100m?

A

Class 1

42
Q

Which Bluetooth class(es) have a max distance of 10m?

A

Class 2

43
Q

Which Bluetooth class(es) have a max distance of 1m?

A

Class 3

44
Q

_______ is a term used to describe a working environment with fewer than 10 employees, typically consists of a single router that combines the functions of a router, switch, and wireless access point.

A

Small office/home office (SOHO)

45
Q

_______ networks typically use standard, consumer level devices. You won’t see enterprise level, 24-port managed switches in this type of networking environment.

A

SOHO

46
Q

Many ______ are able to function as an internet modem, cable internet, or DSL internet connection.

A

routers

47
Q

When setting up a new router, the first step is to change the ________.

A

default login credentials

48
Q

When setting up a new router, the second thing you should do is update to the latest ______. The latest update will fix bugs, security vulnerabilities, and may even add features.

A

firmware version

49
Q

When setting up a new router, the last thing you should do is confiugre the _______ settings.

A

firewall

50
Q

With ______, the router contacts the ISP’s ______ server, which provides the router with all the necessary configuration information, including IP address, subnet mask, and DNS server.

A

DHCP

51
Q

_______ is a protocol typically used by DSL providers that allows them to regulate internet access using username and password authentication.

A

Point-to-Point protocol over Ethernet (PPPoE)

52
Q

When an internet connection has been established, the next step is to allow hosts to connect to the network and obtain internet access. The router uses a networking technique called _____ to do this.

A

network address translation (NAT)

53
Q

What networking technique assigns internal devices a private IP address, then associates it with the public IP address used by the router, allowing multiple devices to use the same IP address?

A

NAT

54
Q

Before sending a request, NAT uses a technique called ______ to append a randomly selected port number between 49,152 and 65,535 to the end of the public IP address.

A

port address translation (PAT)

55
Q

What restricts or blocks specific web traffic based on keywords, URLS or time of day?

A

content filtering aka parental controls

56
Q

______ is an application of NAT that redirects a communication request from one address and port number combo to another while the packets are traversing a network gateway, such as a router.

A

Port forwarding or port mapping

57
Q

_____ gives priority to certain types of network traffic, such as VoIP phone traffic. In most cases, it’s used for voice and video streams.

A

Quality of service (QoS)

58
Q

______ allows or rejects client connections by hardware address by limiting connectivity to a list of MAC addresses.

A

MAC address filtering

59
Q

Other wireless transmitting devices (such as cordless phones and microwaves) and generators cause interference for ________. To avoid, place ______ high up by going through building foundations.

A

wireless access points (AP)

60
Q

The _______ is a system of connected computing devices that uses unique identifiers, or UIDs, and can send data over a network without requiring human interaction.

A

Internet of Things (IoT)

61
Q

Heart monitor implant, greenhouse monitoring light + heat + humidity in soil, and household appliances are all examples of ______ types. Any object that can be assigned an IP address and is able to transfer data over a network can use UIDs and become part of the _______.

A

Internet of Things (IoT)

62
Q

A _______ is a device that allows you to control hardwired lights, ceiling fans, electric fireplaces, small appliances, and even garbage disposal with an app on your phone or a voice-controlled virtual assistant.

A

smart switch

63
Q

A ______ is an electromechanical device that can be locked and unlocked using a smart phone. It uses a wireless protocol and a cryptographic key to execute the authorization process. It can also monitor access and send alerts related to the status of the device.

A

smart lock

64
Q

Smart locks use Bluetooth SMART and ____ to communicate, encrypting communications using 128/256-bit AES. Some work with Z-Wave as well.

A

SSL or Secure Sockets Layer

65
Q

A ______ is a centralized source of information as well as a home assistant device. Depending on the model and brand, it can control all the small appliances and systems in your home like the thermostat, lighting, door locks, window shades, security monitoring, etc.

A

smart speaker

66
Q

A big thing people have expressed concern about in regards to smart speakers is ______.

A

data security

67
Q

______ is a standards-based wireless technology that enables wireless machine-to-machine, or M2M, and IoT networks. It’s designed for low-data-rate, low-power applications and its an open standard.

A

Zigbee

68
Q

Zigbee is a specification based on _______ and the WPANs operate on 2.4 GHz, 900 MHz, and 868 MHz frequencies. Its networks are secured by 128-bit symmetric encryption keys.

A

IEEE 802.15.4

69
Q

The Zigbee specifications, maintained and updated by Zigbee Alliance, boost the _______ standard by adding network and security layers in addition to an application framework.

A

IEEE 802.15.4

70
Q

Name the 3 Zigbee specifications.

A

Zigbee PRO, Zigbee RF4CE, and Zigbee IP

71
Q

______ was created by a Danish company called Zensys. It uses AES-128 symmetric encryption, and operates on the 800-900 MHz radio frequency range.

A

Z-Wave

72
Q

Z-Wave devices connect to a central hub that connects to the internet, and use the same connectivity as the hub either directly or through mesh network. This is called a _______ network topology.

A

source-routed mesh

73
Q

Cables run near air conditioners, lights, or other large electronic devices can create ______ for data traveling through the cable.

A

electromagnetic interference (EMI)

74
Q

What is the name of the software-controlled switch that disables all wireless functionality?

A

airplane mode

75
Q

What are the 2 types of antenna types commonly used in wireless networks?

A

directional and omnidirectional

76
Q

______ describes the process of signal degradation as it passes through network media.

A

Attenuation