Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
34 Cards in this Set
- Front
- Back
What wireless standard uses the 2.4 GHz frequency band, has 11 Mbps throughput, and a range of 100 meters? |
802.11b
|
|
What wireless standard uses the 5 GHz frequency band, has 54 Mbps throughput, and a range of 20 meters?
|
802.11a |
|
What wireless standard uses the 2.4 GHz frequency band, has 54 Mbps throughput, and a range of 100 meters?
|
802.11g |
|
What wireless standard uses either 2.4 or 5 GHz frequency band, has 65-600 Mbps throughput, and a range of 400 meters? |
802.11n |
|
What wireless standard uses the 5 GHz frequency band, has 1.3 - 6.93 Gbps throughput? |
802.11ac Range is unknown at this time. 802.11ac is being released in three waves. Wave three will have a max theoretical throughput of 6.93 Gpbs. 802.11ac is the first wireless standard to reach speeds like gigabit Ethernet. |
|
Issues signals along a single direction. |
Unidirectional antenna or directional antenna |
|
Issues wireless signals in all directions. |
Omnidirectional antenna
|
|
When a wave encounters an obstacle and bounces off toward its source. |
Reflection |
|
When a wireless signal splits into secondary waves when it encounters an obstacle is known as what? |
Diffraction |
|
When a wireless signal breaks up into many signals due to encountering an object smaller than its own wavelength is called what? Usually reflects off of a surface in many directions. |
Scattering |
|
The 2.4 GHz band offers how many channels in the united states. How many over seas? |
11 in the U.S. 14 over seas |
|
In this wireless structure nodes transmit directly to each other via wireless NICs. A wireless LAN where nodes communicate directly with each other. |
ad hoc WLAN |
|
Wireless LAN topology where nodes communicate with an access point and not each other. |
Infrastructure WLAN |
|
Wireless LAN topology where multiple access points work as peer devices providing more fault tolerance. |
Mesh WLAN |
|
A type of hacking attack in which a Bluetooth connection is used to send unsolicited data. |
Bluejacking |
|
A type of hacking attack in which a Bluetooth connection is used to download data without the owner's permission. |
Bluesnarfing |
|
This type of standard does not eliminate the potential for collisions, but minimizes collisions. It does this by checking the channel for for activity and if it does it waits a brief amount of time before checking the channel again. |
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) |
|
A situation in which nodes cannot collaborate to prevent collisions is known as what? A node on one side of the coverage area is too far apart from other nodes of the same coverage area. |
Hidden Node Problem |
|
This protocol ensures packets are not inhibited by other transmissions. Efficient for large transmission packets. Decreases overall 802.11 efficiency. |
RTS/CTS (Request to Send/Clear to Send) |
|
A unique character string used to identify an access point. |
SSID (Service Set Identifier) |
|
In ______ scanning a wireless enabled PC listens on all channels with its frequency range for a special signal known as a _______ ________ that is issued by the access point. |
Passive Scanning; beacon frame |
|
In ________ ________ scanning, a computer transmits a special frame known as a ________. |
Active scanning; probe |
|
This type of access point is unauthorized by the network and can be used to steal data or access the network that trusts your system. |
Rouge Access Point or Evil Twin |
|
What is responsible for carrying data between stations in an 802.11 network? |
Data Frames
|
|
How many address fields are in a 802.11 data frame? |
4 |
|
Issues multiple signals strengths and increases the range of a signal and the data carrying capacity. This technology gives access point the ability to use multiple antennas. |
MIMO (multiple input-multiple-output) |
|
This technology allows access points to use multiple antennas to send multiple signals simultaneously. |
MU-MIMO (Multiuser MIMO) |
|
The combination of two adjacent 20MHz frequency bands to create one 40 MHz frequency band is known as what? |
Channel Bonding |
|
The use of an algorithm to scramble data into a format that can be read only reversing the algorithm is known as what? |
Encryption |
|
A wireless security in which keys are the same in all clients and access points (static keys). This means that there is a "community" key shared by everyone using the same access point. |
WEP (Wired Equivalent Privacy) Outdated security method |
|
This wireless security method dynamically assigns every transmission its own key. |
WPA (Wi-Fi Protected Access or Wireless Protected Access) |
|
A security threat in which a person drives around searching for unprotected wireless data transmissions. |
War Driving |
|
In IEEE terminology, a group of stations that share an access point are said to be part of what? |
BSS (Basic Service Set) |
|
What four frequency bands are used in the 5.4 GHz range? |
5.1 GHz 5.3 GHz 5.4 GHz 5.8 GHz |