Wireless Networks Flashcards

1
Q

CSMA/CA is used in…

A

Carrier Sense Multiple Access with Collision Avoidance
Used in wireless networks, while CSMA/CD is used in wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CSMA/CD is used in…

A

Carrier Sense Multiple Access with Collision Detection
Used in wired networks, while CSMA/CA is used in wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is IBSS

A

Independent Basic Service Set
Also called ad hoc
A wireless network in which two or more wireless devices connect directly without using an AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is BSS

A

Basic Service Set
Wireless infrastructure in which clients connect to each other via an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ESS

A

Extended Service Set
Connects BSS’s to each other via a switch stack over a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WGB/uWGB

A

Universal Workgroup Bridge is an 802.11 standard which allows a device to be bridge onto a wireless network (like a wifi adapter)

WGB is a Cisco-proprietary version of a uWGB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DS

A

Distributed System
The upstream wired network that connects the wireless network to the MDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 802.11 connection states?

A

Not authenticated, not associated
Authenticated, not associated
Authenticated, and associated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the authentication process?

A

A client sends a probe request to learn about what APs and BSSs are available
An AP sends a probe response
A client sends a authentication request (password)
AP authenticates it
Probe sends association request
AP sends association response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 802.11 message types?

A

Management: Beacon, Probe request, Authentication, Association, etc.
Control: Used to control access to the medium (RF) Assists with delivery of management and data frames
RTS, CTS, ACK, etc. CSMA/CD
Data: Used to send actual data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lightweight AP is also called

A

split-MAC architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tunnels created between the AP and WLC use port#:

A

UDP 5246/7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bridge/Mesh mode

A

A lightweight AP deployment. Can be a dedicated bridge between sites, even over long distances. A mesh can be made between the access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WEP uses which encryption method?

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three main entities of 802.1x?

A

Supplicant: The device that wants to connect to the network
Authenticator: The device that provides access to the network
Authentication Server (AS): The device that receives client credentials and permits/denies access

17
Q

How does LEAP work?

A

Lightweight Extensible Authentication Protocol
Both clients and server exchange challenge phrases and use those to authenticate. It is Dynamic, meaning the keys frequently change.

18
Q

How does EAP-FAST work?

A

A PAC (Protected Access Credential) is generated and passed from server to the client.
A secure TLS tunnel is established between the client and auth server
In the tunnel, the client and server communicate to authenticate the client.

19
Q

EAP-TLS

A

EAP-TLS requires every client on the AS to have a certificate
Most secure, but most difficult to implement

19
Q

How does PEAP (Protected EAP) work?

A

Establishes a TLS tunnel
Instead of PAC, it uses a digital certificate to establish a tunnel
Uses MS-CHAP to authenticate in the tunnel

20
Q

What is a MIC

A

Message Integrity Check

21
Q

What is TKIP

A

Temporal Key Integrity Protocol
Used as a solution to WEP. More secure
Used in WPA1

22
Q

What is CCMP

A

Counter/CBC-MAC Protocol)
Used in WPA2
Uses AES
Uses CBC-MAC (Cipher Block Chaining Message Authentication Code) is used as a MIC

23
Q

What is GCMP

A

(Galois/Counter Mode Protocol)
AES counter mode for encryption
More secure and efficient than CCMP
Used in WPA3
GMAC for MIC

24
Q

WPA, WPA2, and WPA3 support which two authentication modes?

A

Personal mode, using a PSK
Enterprise mode, using an AS (RADIUS, etc)

25
Q

WPA uses:

A

TKIP to provide encryption/MIC

26
Q

WPA2 uses:

A

CCMP for encryption/MIC

27
Q

WPA3 uses:

A

GCMP for encryption
GMAC for MIC

28
Q

Which WPA3 security feature protects the four way handshake when using personal mode authentication?

A

SAE
Simultaneous Authentication of Equals

29
Q

What is LAG

A

Link-Aggregation Group (Similar to Etherchannel)