Wireless Networks Flashcards

1
Q

What is Direct Sequence Spread Spectrum (DSSS)?

A

DSSS modulates data over a wide frequency range using “chips.” It is susceptible to interference and has limited channel availability, typically with overlap on channels 1, 6, and 11.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Frequency Hopping Spread Spectrum (FHSS)?

A

FHSS enhances security by hopping between predetermined frequencies, but it offers reduced bandwidth and slower performance, making it less common in commercial networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is Orthogonal Frequency Division Multiplexing (OFDM)?

A

OFDM is used in modern wireless standards (G, N, AC, AX) due to better interference resistance and high data rates, utilizing multiple small data streams for increased bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the range and limitation of the 2.4 GHz frequency band?

A

The 2.4 GHz band has 11 channels in the US, but only three non-overlapping channels (1, 6, 11), leading to congestion and interference, especially with older standards like B, G, and N.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is the 5 GHz band preferred for modern networks?

A

The 5 GHz band offers more channels (up to 24) and supports wider channels (up to 160 MHz), leading to higher speeds and less interference compared to the 2.4 GHz band.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is channel bonding in wireless networks?

A

Channel bonding combines multiple channels (e.g., 40 MHz, 80 MHz) to increase bandwidth, though it can increase interference due to fewer available channels for other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the key wireless security protocols?

A

• WEP: Outdated and insecure, uses weak encryption.
• WPA: Uses TKIP with stronger encryption but still weak.
• WPA2: Uses AES and CCMP for strong encryption, preferred security standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the key difference between WPA2 Personal and WPA2 Enterprise?

A

WPA2 Personal uses a single Pre-Shared Key (PSK) for authentication, while WPA2 Enterprise uses individual credentials for each user, ideal for larger networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are the types of fixed wireless technologies?

A

• Wi-Fi: Short-range, point-to-point connections.
• Cellular: Stationary hotspots for high-speed internet.
• Microwave: Long-range, point-to-point connections (up to 40 miles).
• Satellite: Long-distance connections, ideal for remote areas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is NFC used for?

A

NFC enables short-range data transfer for mobile payments (e.g., Apple Pay), contactless device connections, and POS systems, but is vulnerable to interception via RFID skimmers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Bluetooth, and what are its security risks?

A

Bluetooth connects devices within a Personal Area Network (PAN) over 2.4 GHz. Security risks include Bluejacking (unwanted messages) and Bluesnarfing (unauthorized data access).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the main use of tethering in mobile devices?

A

Tethering allows sharing cellular data with other devices via Wi-Fi, Bluetooth, or USB, but connecting to unknown hotspots can lead to data interception.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly