Wireless Networks Flashcards

1
Q

Why is wireless networking important in modern workplaces?

A

It allows for mobility, enabling productivity from various locations and at different times.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are some common wireless technologies?

A

Wi-Fi (IEEE 802.11), Bluetooth (IEEE 802.15), and WiMAX (IEEE 802.16).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does CSMA/CA stand for?

A

Carrier Sense Multiple Access with Collision Avoidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the key properties of wireless media?

A

Coverage area, interference, and security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the IEEE 802.11 standards commonly referred to as?

A

Wi-Fi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the maximum speed and frequency of 802.11a?

A

54 Mbps, 5 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the maximum speed and frequency of 802.11b?

A

11 Mbps, 2.4 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the maximum speed and frequency of 802.11g?

A

54 Mbps, 2.4 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the maximum speed and frequency of 802.11n?

A

600 Mbps, 2.4 GHz or 5 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the maximum speed and frequency of 802.11ac?

A

1 Gbps, 5 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the maximum speed and frequency of 802.11ad?

A

7 Gbps, 2.4 GHz, 5 GHz, and 60 GHz.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the primary function of wireless NICs in wireless deployment?

A

To provide wireless connectivity to end devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are SOHO/home wireless solutions typically composed of?

A

An integrated wireless router serving as an access point, Ethernet switch, and router.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the three primary wireless network topologies?

A

Ad hoc, infrastructure, and extended service set (ESS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the hidden node problem in wireless networks?

A

A situation where a device cannot detect another device’s transmissions, leading to collisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is the hidden node problem resolved?

A

Using Request to Send/Clear to Send (RTS/CTS) mechanisms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the purpose of beacon frames in wireless networks?

A

To advertise the presence and parameters of an access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the steps in the three-stage association process for wireless clients?

A

Probing, Authentication, Association.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the significance of using non-overlapping channels in wireless networks?

A

To minimize interference and maximize throughput.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some common wireless security threats?

A

DoS attacks, rogue access points, man-in-the-middle attacks, war driving.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is a rogue access point?

A

An unauthorized access point connected to the network, potentially used for malicious activities.

22
Q

What is a man-in-the-middle attack in wireless networks?

A

An attacker introduces a rogue AP with the same SSID as a legitimate AP to intercept and forward data.

23
Q

What are the primary methods for securing WLANs?

A

Authentication and encryption.

24
Q

What is WPA and WPA2?

A

Wi-Fi Protected Access and its successor, providing improved security for wireless networks.

25
Q

What encryption method does WPA2 use?

A

Advanced Encryption Standard (AES).

26
Q

What are the two types of authentication supported by WPA and WPA2?

A

Personal (PSK) and Enterprise (using RADIUS server).

27
Q

What is the purpose of the RADIUS server in enterprise wireless authentication?

A

To provide centralized authentication using user accounts.

28
Q

What is war driving?

A

Searching for Wi-Fi networks using a laptop or smartphone to gain unauthorized access.

29
Q

What is the impact of physical obstructions on wireless signals?

A

They can interfere with signal propagation, reducing coverage area and signal strength.

30
Q

How can external interference affect wireless networks?

A

Devices like microwaves and cordless phones can introduce noise, disrupting communication.

31
Q

What is the significance of proper access point placement in wireless networks?

A

Ensures optimal coverage and minimizes interference.

32
Q

What are the common non-overlapping channels used in the 2.4 GHz band?

A

Channels 1, 6, and 11.

33
Q

What is an ESS (Extended Service Set) in wireless networks?

A

A network topology with multiple access points providing broader coverage.

34
Q

What is the function of a wireless LAN controller?

A

To centrally manage and configure multiple access points in a large network.

35
Q

What are the advantages of using a controller-based wireless network?

A

Simplified management, reduced interference, and consistent configuration.

36
Q

What are beacon frames used for in wireless networks?

A

To advertise the presence and capabilities of an access point to nearby devices.

37
Q

What is CSMA/CA’s role in wireless networks?

A

To prevent collisions by requiring devices to sense the channel before transmitting.

38
Q

What are the key differences between WPA and WEP?

A

WPA uses TKIP for encryption and is more secure, while WEP uses RC4 and is less secure.

39
Q

What is the role of the SSID in wireless networks?

A

To uniquely identify a wireless network.

40
Q

What is the difference between passive and active scanning in wireless networks?

A

Passive scanning listens for beacons, while active scanning sends probe requests.

41
Q

What is a DoS attack in the context of wireless networks?

A

An attack that disrupts network service, making it unavailable to legitimate users.

42
Q

How can rogue access points be detected in a wireless network?

A

By actively monitoring the radio spectrum for unauthorized devices.

43
Q

What is the purpose of encryption in wireless communication?

A

To ensure that data transmitted over the air is protected from unauthorized access.

44
Q

Why is the 5 GHz band less prone to interference than the 2.4 GHz band?

A

Fewer devices operate in the 5 GHz band, reducing the likelihood of interference.

45
Q

What is the function of the clear to send (CTS) frame in wireless communication?

A

To indicate that the channel is reserved for transmission by a specific device.

46
Q

What is the significance of the extended system ID (SSID) in wireless networks?

A

It allows users to identify and connect to the correct wireless network.

47
Q

What is the difference between open and shared key authentication?

A

Open authentication does not require a password, while shared key uses a pre-shared key.

48
Q

What are the main components of a wireless network infrastructure?

A

Access points, wireless controllers, and client devices.

49
Q

What is the purpose of the IEEE 802.11i standard?

A

To enhance security for wireless networks, implemented as WPA2.

50
Q

Why is AES preferred over TKIP in wireless encryption?

A

AES provides stronger encryption and is more secure than TKIP.

51
Q

What are the main security risks associated with open Wi-Fi networks?

A

Unauthorized access, data interception, and man-in-the-middle attacks.

52
Q

How does WPA2-Enterprise provide enhanced security?

A

By requiring user authentication through a RADIUS server and supporting 802.1X.