Wireless Networks Flashcards
OBJ 2.3: Compare and contrast protocols for wireless networking
What does Direct-Sequence Spread Spectrum (DSSS) do?
Modulates data over an entire range of frequencies using a series of signals known as chips.
What is the function of Frequency-Hopping Spread Spectrum (FHSS)?
Allows devices to hop between predetermined frequencies.
Define Orthogonal Frequency Division Multiplexing (OFDM).
Uses a slow modulation rate with simultaneous transmissions over 52 different data streams.
What is a channel in wireless networking?
A virtual medium through which wireless networks can send and receive data.
How many channels can be used in the 2.4 GHz spectrum?
11 or 14 channels.
Which channels in the 2.4 GHz band avoid overlapping frequencies?
Channels 1, 6, and 11.
What is the frequency range for the 5 GHz band?
5.725-5.875 GHz.
How many non-overlapping channels are there in the 5 GHz band?
24 non-overlapping channels.
What is channel bonding?
Allows for the creation of a wider channel by merging neighboring channels into one.
What is the standard channel size for both 2.4 GHz and 5 GHz networks?
20 MHz.
What does Multiple-Input and Multiple-Output (MIMO) utilize?
Uses multiple antennas to send and receive data.
What is Multiple User Multiple Input Multiple Output (MU-MIMO)?
Allows multiple users to access the wireless network and access point at the same time.
What causes Radio Frequency Interference (RFI)?
Occurs when there are similar frequencies to wireless networks in the area.
True or False: As signal strength decreases, the signal-to-noise ratio improves.
False.
What is a Pre-Shared Key in wireless security?
Both the access point and the client use the same encryption key.
Is Wired Equivalent Privacy (WEP) considered secure?
No, it is an insecure security protocol.
What Initialization Vector (IV) size does WEP use?
24-bit Initialization Vector (IV).
What protocol replaced WEP and follows the Temporal Key Integrity Protocol (TKIP)?
Wi-Fi Protected Access (WPA).
What does WPA use instead of WEP’s 24-bit IV?
48-bit Initialization Vector (IV).
What encryption method does WPA use?
Rivest Cipher 4 (RC4).
What is the purpose of the Message Integrity Check (MIC)?
To confirm data was not modified in transit.
What is Enterprise Mode in WPA?
To authenticate users before exchanging keys.
What wireless protocol was created as part of IEEE 802.11i standard and requires stronger encryption and integrity checking through CCMP?
Wi-Fi Protected Access 2 (WPA2)
What encryption standard does Wi-Fi Protected Access 2 (WPA2) require?
Advanced Encryption Standard (AES).
What is the purpose of Advanced Encryption Standard (AES)?
To provide additional security by using a 128-bit key or higher.
What does MAC Address Filtering do?
Configures an access point with a listing of permitted MAC addresses.
What does disabling SSID Broadcast achieve?
Configures an access point not to broadcast the name of the wireless LAN.
What is Fixed Wireless?
Creates point to point connections from one building to another over a relatively short distance.
How does Cellular technology differ from Fixed Wireless?
Uses a larger antenna and a larger hotspot powered by a power outlet.
What is the coverage distance of a traditional microwave link?
About 40 miles.
What is the difference between Low Earth Orbit and Geosynchronous Orbit satellites?
Low Earth Orbit requires more satellites for coverage but has lower latency; Geosynchronous Orbit can cover a large area with higher latency.
What technology uses radio frequency to send electromagnetic charge over a short distance?
Near Field Communication (NFC).
What is the purpose of Radio Frequency Identification (RFID)?
A form of radio frequency transmission modified for use in authentication systems.
What type of communication does Infrared Data (IrDA) allow?
Line of sight communication in the infrared spectrum.
What does Bluetooth create?
A personal area network over 2.4 GHz for wireless connectivity.
What is Bluejacking?
Sending unsolicited messages to a Bluetooth device.
What is Bluesnarfing?
Making unauthorized access to a device via Bluetooth connection.
What is BlueBorne?
Allows the attacker to gain complete control over a device without being connected.
What is tethering?
Sharing cellular data Internet connection from a smartphone to multiple other devices.
Which standard has a 5 GHz band and a 54 Mbps Bandwidth?
802.11a
Which standard has a 2.4 GHz band and a 11 Mbps Bandwidth?
802.11b
Which standard has a 2.4 GHz band and a 54 Mbps Bandwidth?
802.11g
Which standard has a 2.4 and 5 GHz band and a 150/600 Mbps Bandwidth using MIMO?
802.11n (Wi-Fi 4)
Which standard has a 5 GHz band and a 6.9 Gbps Bandwidth using MU-MIMO?
802.11ac (Wi-Fi 5)
Which standard has a 2.4, 5, and 6 GHz band and a 9.6 Gbps Bandwidth using MU-MIMO?
802.11ax (Wi-Fi 6)