• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/32

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

32 Cards in this Set

  • Front
  • Back

Name two types of wireless Networks?

  1. ad hoc mode: peer-to-peer
  2. Infrastructure mode: connections are made through wireless access point.

What does the IEEE standard 802.11 define?

Wireless networks

There are four wireless standards what are they?

802.11 (a, b, g, n) A is not compatible with the other three.

802.11n uses two new features to achieve higher transfer rates what are they?

  1. Multiple Input Multiple Output (MIMO) by using multiple antennas to achieve more throughput .
  2. Channel Bonding uses multiple channel to achieve more throughput.
Different Wireless Standards
802.11a 802.11b 802.11g 802.11n
Frequency 5 GHz 2.4 GHz 2.4 GHz 2.4 GHz or 5 GHzTransfer Rate 54 Mbps 11 Mbps 54 Mbps Up to 600 MbpsRange 150 Feet 300 Feet 300 Feet 300 FeetCompatibility a b/g/n b/g/n a/b/g

Name the different wireless standards.

  1. 802.11a
  2. 802.11b
  3. 802.11g
  4. 802.11n

Which Wireless standard is incompatible with the 802.11b and 802.11g wireless standards?

802.11a

Which Wireless standard is the oldest?

802.11a

Which Wireless standard is compatible with 802.11a and why?

802.11n is compatible because, the MIMO scheme of 802.11n does not require simultaneous use of both the 5-GHz and the 2.4-GHz bands.

The different Wireless Standards operate on different Frequency Ranges what are they and which standard is associated with each?

  1. 802.11a 5 GHz
  2. 802.11b 2.4 GHz
  3. 802.11g 2.4 GHz
  4. 802.11n 2.4 GHz and 5 GHz

The different Wireless Standards operate on different Transfer Rates what are they and which standard is associated with each?

  1. 802.11a 54 Mbps
  2. 802.11b 54 Mbps
  3. 802.11g 54 Mbps
  4. 802.11n Up to 600 Mbps

The different Wireless Standards operate on different Ranges (distances) what are they and which standard is associated with each?

  1. 802.11a 150 feet
  2. 802.11b 300 feet
  3. 802.11g 300 feet
  4. 802.11n 300 feet

What is MIMO?

The wireless LAN IEEE draft standard that uses multiple input/multiple output technology to boost (MIMO) Wi-Fi speeds to over 100Mbps.

What can be done if one is experiencing interference on their wireless network?

Change channels on the wireless network

What are the different Antenna types and what are their characteristics?

  1. Omnidirectional 360-degree radius short distances use more power.
  2. Directional one direction covers longer distances,

What is Wired Equivalent Privacy WEP?

IT is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN by requiring anyone connecting to the network to use a wireless key or passphrase.

WEP can use ___________ or ____________ encryption

64-bit or 128-bit

What is WAP (Wireless Application Protocol)?

Is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging.

What was WAP designed to improve upon?

Security and to fix some of the flaws found in WEP.

What kind of encryption key does WAP use?

  1. A 128-bit key and the Temporal Key Integrity Protocol (TKIP) which is a protocol used to change the encryption keys for every packet that is sent.
  2. Improved integrity checking
  3. Supports authentication using the Extensible Authentication Protocol (EAP) that can use Kerberos, token cards, certificates and smartcards.

EAP messages are encapsulated inside _______ packets for network access authentication with wired or wireless networks.

802.1x

Two common EAP protocols are LEAP and PEAP describe them.

  1. LEAP is the Light Extensible Authentication proprietary Protocol created by Cisco.
  2. PEAP Protected Extensible Authentication Protocol used to encapsulate EAP messages over a secure Tunnel that uses Transport Layer Security (TLS) Creates a secure tunnel between two points.

What are the WPA operating modes?

  1. WPA Personal (WPA-PSK): which means WPA preshared key. Used in homes. Uses (TKIP)
  2. WPA Enterprise: WPA-802.1x uses RADIUS for authenticating and auditing. Used by larger companies. Uses CCMP AES for symmetric encryption.

What is first step when using the Wireless Networking Best Practices?

  1. Change admin password

What is the Service Set Identifier (SSID) and what should you do once it is changed?

The name you give your wireless network. You should configure the router not to advertise the SSID by disabling SSID broadcasting.

What can the tools Kismet and NetStumbler be used for?

To do a wireless survey to get a list of wireless networks that are nearby.

What is a Captive Portal?

It forces a person to authenticate to the network via a web page before Internet access is allowed.

Name seven best practices for Security when setting up a network.

  1. Change admin password
  2. Set SSID
  3. Use MAC filtering
  4. Configure encryption WEP, WPA, WPA2
  5. Place the access point in the center of the building
  6. Lower power levels to control signal distance
  7. Use VPN for high security

Name seven vulnerabilities that wireless Networks have?

  1. Data Emanation, Jamming/Interference and Packet Sniffing.
  2. War Driving/Chalking
  3. SSID Broadcasting
  4. WPS and Replay Attacks
  5. Blue-jacking and Blue-snarfing
  6. Rogue Access Points and Evil Twins
  7. Weak Encryption and IV Attacks

WEP, WPA and WPKA2 have been cracked what should you treat wireless clients?

Yes all three have been cracked therefore wireless clients should be treated as remote clients and VPN should be used.

Why is it necessary to perform Site Surveys?

To find rogue devices.

What is Near Field Communication?

A type of wireless communcation that is a smart phone standard that allows you to bring the mobile devices withing inches of one another to transfer information.