Wireless Networks Flashcards

1
Q

CSMA/CA is used in…

A

Carrier Sense Multiple Access with Collision Avoidance
Used in wireless networks, while CSMA/CD is used in wired networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CSMA/CD is used in…

A

Carrier Sense Multiple Access with Collision Detection
Used in wired networks, while CSMA/CA is used in wireless networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is IBSS

A

Independent Basic Service Set
Also called ad hoc
A wireless network in which two or more wireless devices connect directly without using an AP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is BSS

A

Basic Service Set
Wireless infrastructure in which clients connect to each other via an access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is ESS

A

Extended Service Set
Connects BSS’s to each other via a switch stack over a wired network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

WGB/uWGB

A

Universal Workgroup Bridge is an 802.11 standard which allows a device to be bridge onto a wireless network (like a wifi adapter)

WGB is a Cisco-proprietary version of a uWGB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

DS

A

Distributed System
The upstream wired network that connects the wireless network to the MDF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the 3 802.11 connection states?

A

Not authenticated, not associated
Authenticated, not associated
Authenticated, and associated

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the authentication process?

A

A client sends a probe request to learn about what APs and BSSs are available
An AP sends a probe response
A client sends a authentication request (password)
AP authenticates it
Probe sends association request
AP sends association response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the 802.11 message types?

A

Management: Beacon, Probe request, Authentication, Association, etc.
Control: Used to control access to the medium (RF) Assists with delivery of management and data frames
RTS, CTS, ACK, etc. CSMA/CD
Data: Used to send actual data packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Lightweight AP is also called

A

split-MAC architecture

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Tunnels created between the AP and WLC use port#:

A

UDP 5246/7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Bridge/Mesh mode

A

A lightweight AP deployment. Can be a dedicated bridge between sites, even over long distances. A mesh can be made between the access points

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

WEP uses which encryption method?

A

RC4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three main entities of 802.1x?

A

Supplicant: The device that wants to connect to the network
Authenticator: The device that provides access to the network
Authentication Server (AS): The device that receives client credentials and permits/denies access

17
Q

How does LEAP work?

A

Lightweight Extensible Authentication Protocol
Both clients and server exchange challenge phrases and use those to authenticate. It is Dynamic, meaning the keys frequently change.

18
Q

How does EAP-FAST work?

A

A PAC (Protected Access Credential) is generated and passed from server to the client.
A secure TLS tunnel is established between the client and auth server
In the tunnel, the client and server communicate to authenticate the client.

19
Q

EAP-TLS

A

EAP-TLS requires every client on the AS to have a certificate
Most secure, but most difficult to implement

19
Q

How does PEAP (Protected EAP) work?

A

Establishes a TLS tunnel
Instead of PAC, it uses a digital certificate to establish a tunnel
Uses MS-CHAP to authenticate in the tunnel

20
Q

What is a MIC

A

Message Integrity Check

21
Q

What is TKIP

A

Temporal Key Integrity Protocol
Used as a solution to WEP. More secure
Used in WPA1

22
Q

What is CCMP

A

Counter/CBC-MAC Protocol)
Used in WPA2
Uses AES
Uses CBC-MAC (Cipher Block Chaining Message Authentication Code) is used as a MIC

23
Q

What is GCMP

A

(Galois/Counter Mode Protocol)
AES counter mode for encryption
More secure and efficient than CCMP
Used in WPA3
GMAC for MIC

24
WPA, WPA2, and WPA3 support which two authentication modes?
Personal mode, using a PSK Enterprise mode, using an AS (RADIUS, etc)
25
WPA uses:
TKIP to provide encryption/MIC
26
WPA2 uses:
CCMP for encryption/MIC
27
WPA3 uses:
GCMP for encryption GMAC for MIC
28
Which WPA3 security feature protects the four way handshake when using personal mode authentication?
SAE Simultaneous Authentication of Equals
29
What is LAG
Link-Aggregation Group (Similar to Etherchannel)