1.6

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is EAP-TLS?

-Install a certificate on both the authentication server and the client -An authentication server pair of keys and a client pair of keys needs to be generated first, signed using PKI, and installed on the devices. -On the station side, the keys can be issued for the machine itself and/or for the user.

What are the non-overlapping channels in the 2.4GHz range?

1,6, and 11

What much should APs overlap in a network?

10 percent or more

What is the theoretical maximum data transfer rate of the 802.11b standard?

11Mbps

How many channels are available in the 2.4GHz range?

14

What is the maximum data rate transmission of the 802.11ac standard?

1Gbps

What frequncy does the 802.11n standard use?

2.4GHz and 5 GHz

What band does 802.11b use to transmit data?

2.4Ghz

What frequency does the 802.11g standard use?

2.4Ghz

How wide are the 2.4GHz channels?

22MHz

How many channels did the 802.11h standard use?

23 non-overlapping 5GHz channels

How many channels are offered in the 802.11a 5GHz band?

23 non-overlapping channels

What is the theoretical maximum data transfer rate of the 802.11n standard?

250 Mbps or 500 Mbps

What is the theoretical maximum transfer distance of the 802.11g standard?

300 ft

What is the theoretical maximum distance of the 802.11b standard?

350 feet

What size channels does the 802.11n channel use?

40 Mhz (via channel bonding)

What frequency does the 802.1ac use?

5 GHz

What is the maximum distance a 802.11 a device can transmit?

50 ft

What is the maximum theoretical data transmission rate of the 802.11g standard?

54Mbps

What is the theoretical maximum data transfer rate of a 802.11a device?

54Mbps

What frequency does the 802.11h standard use?

5GHz

What frequency range does the 802.11a use?

5Ghz

What unlicensed bands are designated for public use by the FCC?

900 MHZ, 2.4 GHz, and 5 GHz

How can you mitigate Ad hoc networks from being created on a corporate network?

A cisco unified wireless network can send out deauthentication frames to prevent ad hoc associations

What is rate shifting?

A data rate of a WAP diminishing as the host gets further away from it

What is MAC effiiciency?

A feature introduced with the 802.11n standard that allows many packets to be transmitted without an acknowledgement being sent

What is CCK?

A modulation technique supports LANs with a maximum throughout of 11Mbps. It includes a pare of codes called chipping sequences which are complementary to each others.

What is RADIUS?

A networking protocol that offers us several security benefits: authorization, centralized access, and accounting supervision regarding the users and/or computers that connect to and access our networks.

What is an omnidirectional antenna?

A point-to-multipoint antenna that provides equal power dispersion in almost all directions. It is the primary access point used with WAPs

What is a Yagi antenna?

A point-to-point antenna that is best used for point-to-point bridging of access points.

What is PKI?

A public key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.

What is an extended basic service set?

A service set with two or more APs

What is a wireless access point?

A wireless bridge used in a multipoint RF network.

What is management frame protection?

A wireless feature that increases the security of management frames

What is DFS (Dynamic Frequency Range Selection)?

A wireless point feature that continueously monitors a device's operating range for any radar signals that are allowed to operated in portions of the 5GHz band as well as 802.11a before transmitting

What are the two AP operating modes?

Access Point Bridging

What are tools can you use at site surveys?

AirMagnet Survey Ekahau Site Survey

What is the Client Mode management frame?

All management frames between the AP and the station are protected because clients can detect and drop spoofed or invalid management frames.

What is Access Point mode?

Allows an AP to operate as a traditional access point.

What is a basic service set?

Also known as infrastructure mode. It is a wireless network with one AP

What can be used to mitigate passive attacks?

An IPS

What is Rogue AP?

An access point not authorized to be up and running by the corporate office by the WLAN administrators of the office.

What is an Independent Basic Service Set?

An adhoc network of two or more wireless devices without an access point

What are features of TKIP?

Boosting encryption strength Serving as a WEP code wrapper and also adding pre-packet mixing of media access control (MAC) based keys and serial numbers Assigning a unique 48-bit sequencing number to each packet Utilizing the RC4 stream cipher - 128-bit encryption keys and 64-bit authentication keys.

How does the 802.11ac standard acheive such high speeds?

Channel bonding. Either 160 MHz, 80 MHz, or 40 MHz

What is CDMA?

Code Division multiple access assigns a unique code to each call or transmission and sreads the data across the spectrums, allowing a call to make use of all frequencies.

What modulation technique does the 802.11b standards use?

DSSS

What modulation technique does the 802.11g standards use?

DSSS and OFDM

What modulation technique does the 802.11n standards use?

DSSS, CCK, and OFDM

What is DSSS?

Direct Sequence Spread Spectrum. A modulation technice that creates a redundant bit pattern for each bit that is transmitted. If one or more bits in the bit pattern are damaged in transmission, the original data may be recoverable from the redundant bits.

What can cause wireless signal degradation?

Distance Walls and Other Barriers Protocols Used Interference

What is EAP?

Extensible Authentication Protocol Is not a single protocol but a frame-work for port-based access control that uses the same three components that are used in RADIUS. A wide variety of these include certificates, a PKI, or even simple passwords.

What is FDMA?

Frequency Division Multiple Access is one of the modulation techniques used in cellular wireless networks. it divides the frequency range into bands and assigns a band to each subscriber. This was used in 1G cellular networks

What is GSM?

Global System Mobile is a type of cellphone that contains a subscriber Identify Module (SIM) chip.

What is EAP-FAST?

In the first stage, a TLS tunnel is established. Unlike PEAP, however, EAP-FASTs first stage is established by using a per-shared key calles a Protection Authentication Credential (PAC). In the second stage, a series of type/length/value (TLV)-encoded data is used to carry a user authentication.

What are the steps of a WLAN site survey?

Information Gathering Predeployment Site Survey Postdeployment Site Survey

What is a way to mitigate rogue APs from connecting to a network?

Install a wireless lan controller. The APs will signal to the WLC when a new AP is added to the network

What is the MFP management frame?

It looks for management frames that aren't from known APs and sends an alert. Used to mitigate APs

What technology was introduced with the 802.11n standard?

MIMO

What is MIMO?

Multiple-Input, Multiple-Output. Several frames are sent by several antennas over several paths and are then recombined by another set of antennas to optimize throughput and multipath resistance.

What modulation technique does the 802.11a standards use?

OFDM

What modulation technique does the 802.11ac cstandards use?

OFDM

What is OFDM?

Orthogonal Frequency Division Multiplexing. A modulation technique that is implemented with a system of 52 subcarriers. This distributes that data over the 52 subcarrierrs, which are spaced at precise frequencies.

What is PPP?

Point-to-point protocol. The protocol used with dial-up connections to the Internet. its functions incloude error control, security, dynamic IP addressing, and support of multiple protocols.

What is PEAP?

Protected Extenisble Authentication Protocol Is a protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel. It requires only a server-side PKI certificate to create a sure TLS tunnel to protect user authentication

What is WPA?

Provides a standard for authentication and encryption of WLAN's that indented to solve known security problems. Works with PSK and TKIP/AES

What is bridging mode?

Provides a wireless bridge between two wired network segments.

What modulation technique does the 802.11ac standard use?

QAM-256

What is RSSI?

Received signal strength indication. A measurement of the power present in a received radio signal

What is goodput?

Refers to the actual data throughput, not the theorectial number that the standards describe.

What is SNR?

Signal to noise ratio. Compares the level of a desired signal to the level of backgroun noise.

What is a distribution system?

The name of the connection from a access point to a wired network

What are the first key factors to be determined during the information gathering stage of a site survey?

The scope of the network The areas that must be covered and the expected capacity The types of devices that need to be supported

What happens when you connect an 802.11b device to an 802.11g network?

The speed of the network can only be a maximum of 11 Mbps because the 802.11g downgrades to using the DSSS modulation technique instead of the Othogonal Frequency Division Multiplexing ODFM

What is an SSID?

The unique 32 character identifier that represents a particular network.

What is Request to Send, Clear to Send (RTS/CTS)?

This is a protocol that was developed to help wireless networks detect and avoid packet collisions. On these networks, the sending node first sends and RTS frame to the destination node, which sends a CTS frame in return indicating that it can continue its transmission. Upon transmission, the sending node waits for an acknowledgment that indicates the receiving node is ready for another data packet.

How many channels does the 802.11b standard use?

Three non-overlapping channels.

What is TDMA?

Time Division Multiple Access increases the speed over FDMA by dividing the channels into time slots and assigning slots to calls. This also helps to prevent eavesdropping in calls.

What is TPC?

Transmit Power control. It allows you to modify the signal strength of wireless radios

What is a passive attack?

Where someone monitors data travelling on a network and intercepts any sensitive information they find

What is PSK?

Wifi PSK or WPA-PSK is a system of encryption used to authenticate users on wireless local area networks. Data transmission is encrypted and controlled using an end user's generated password.

Is 802.11g backwards compatible with 802.11b?

Yes

How do Wireless LANs communicate?

half-duplex


Conjuntos de estudio relacionados

Cyber Threat Intelligence Midterm Spring 2018 Dr. Li

View Set

GCSE Chemistry Unit 2.6- Acids, Bases and Salts

View Set

Amino Acid Catabolism: Urea Cycle

View Set

EXAM FX life Texas life insurance practice test

View Set

MSN: Ch 62: Caring for Clients with Traumatic Musculoskeletal Injuries

View Set