Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
32 Cards in this Set
- Front
- Back
Name two types of wireless Networks? |
|
|
What does the IEEE standard 802.11 define? |
Wireless networks |
|
There are four wireless standards what are they? |
802.11 (a, b, g, n) A is not compatible with the other three. |
|
802.11n uses two new features to achieve higher transfer rates what are they? |
|
|
Different Wireless Standards
|
802.11a 802.11b 802.11g 802.11n
Frequency 5 GHz 2.4 GHz 2.4 GHz 2.4 GHz or 5 GHzTransfer Rate 54 Mbps 11 Mbps 54 Mbps Up to 600 MbpsRange 150 Feet 300 Feet 300 Feet 300 FeetCompatibility a b/g/n b/g/n a/b/g |
|
Name the different wireless standards. |
|
|
Which Wireless standard is incompatible with the 802.11b and 802.11g wireless standards? |
802.11a
|
|
Which Wireless standard is the oldest? |
802.11a |
|
Which Wireless standard is compatible with 802.11a and why? |
802.11n is compatible because, the MIMO scheme of 802.11n does not require simultaneous use of both the 5-GHz and the 2.4-GHz bands.
|
|
The different Wireless Standards operate on different Frequency Ranges what are they and which standard is associated with each? |
|
|
The different Wireless Standards operate on different Transfer Rates what are they and which standard is associated with each? |
|
|
The different Wireless Standards operate on different Ranges (distances) what are they and which standard is associated with each? |
|
|
What is MIMO? |
The wireless LAN IEEE draft standard that uses multiple input/multiple output technology to boost (MIMO) Wi-Fi speeds to over 100Mbps.
|
|
What can be done if one is experiencing interference on their wireless network? |
Change channels on the wireless network |
|
What are the different Antenna types and what are their characteristics? |
|
|
What is Wired Equivalent Privacy WEP? |
IT is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usually expected of a wired LAN by requiring anyone connecting to the network to use a wireless key or passphrase.
|
|
WEP can use ___________ or ____________ encryption |
64-bit or 128-bit |
|
What is WAP (Wireless Application Protocol)? |
Is a specification for a set of communication protocols to standardize the way that wireless devices, such as cellular telephones and radio transceivers, can be used for Internet access, including e-mail, the World Wide Web, newsgroups, and instant messaging. |
|
What was WAP designed to improve upon? |
Security and to fix some of the flaws found in WEP. |
|
What kind of encryption key does WAP use? |
|
|
EAP messages are encapsulated inside _______ packets for network access authentication with wired or wireless networks. |
802.1x |
|
Two common EAP protocols are LEAP and PEAP describe them. |
|
|
What are the WPA operating modes? |
|
|
What is first step when using the Wireless Networking Best Practices? |
|
|
What is the Service Set Identifier (SSID) and what should you do once it is changed? |
The name you give your wireless network. You should configure the router not to advertise the SSID by disabling SSID broadcasting. |
|
What can the tools Kismet and NetStumbler be used for? |
To do a wireless survey to get a list of wireless networks that are nearby. |
|
What is a Captive Portal? |
It forces a person to authenticate to the network via a web page before Internet access is allowed. |
|
Name seven best practices for Security when setting up a network. |
|
|
Name seven vulnerabilities that wireless Networks have? |
|
|
WEP, WPA and WPKA2 have been cracked what should you treat wireless clients? |
Yes all three have been cracked therefore wireless clients should be treated as remote clients and VPN should be used. |
|
Why is it necessary to perform Site Surveys? |
To find rogue devices. |
|
What is Near Field Communication? |
A type of wireless communcation that is a smart phone standard that allows you to bring the mobile devices withing inches of one another to transfer information. |