CIS 321 Test 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

version of 802.11 that is the fastest physical transmission standard for sale today

802.11ac

What is the strongest security protocol for 802.11 today?

802.11i

version of 802.11 WLAN standard that uses mimo and sometimes double bandwidth to achieve a rated speed of 100 megabytes per second or more and longer range then earlier speed standards

802.11n Dual Band

2. Access Point

A bridge between a wireless station and a wired LAN.

27. Multiuser MIMO

A form of MIMO in which multiple users can send and receive in the same channel simultaneously.

19. Orthogonal Frequency Division Multiplexing (OFDM)

A form of spread spectrum transmission that divides each broadband channel into subcarriers and then transmits parts of each frame in each subcarrier.

30. Master-Slave Control

Form of transmission in which one host controls the transmission of another host.

10. Personal Mode

Pre-shared Key Mode in WPA or 802.11i.

Optional method for media access control that is much less efficient

RTS

the official standard speed of a technology; advertised speed

Rated speed

16. 802.1x Mode

Security standard for both wired and wireless LANs. Mode of operation in 802.11i security.

16. Unlicensed service bands

Security standard for both wired and wireless LANs. Mode of operation in 802.11i security.

30. 802.11n

Version of the 802.11 WLAN standard that uses MIMO and sometimes doubled bandwidth to achieve a rated speed of 100 Mbps or more and longer range than earlier speed standards.

A security might use SNMP Get commands to ________ and SNMP Set commands to _______.

collect information to look for a rogue access point, change an access point's power

Wi-Fi normally uses a(n) ________.

omnidirectional antenna

Bluetooth uses ________ operation.

one-to-one

Wi-Fi direct ________ uses access points.

never

3. End to End Security

1) A layer where communication is governed directly between the transport process on the source host and the transport process on the destination host. 2) All the way from the source host to the destination host, as opposed to part of the path between the two hosts.

21. Roaming

1) In cellular telephony, the situation when a subscriber leaves a metropolitan cellular system and goes to another city or country. 2) In 802.11, when a wireless host travels from one access point to another.

14. Broadband

1) Transmission where signals are sent in wide radio channels. 2) Any high-speed transmission system.

1. At what layers do wireless LANS operate?

1. Physical Layer 2. Data Link Layer

What is the bandwidth of a channel that extends from 55 MHz to 60 MHz?

5 MHz

Wi-Fi Standards come from the ________ Working Group.

802.11

________ is among the most widely used 802.11 transmission standards used today and dominates Wi-Fi sales.

802.11ac

1. Wireless LANS (WLANs)

A local area network that uses radio transmission instead of cabling to connect devices.

11. Pre-Shared Key (PSK) Initial Mode

A mode of operation in WPA and 802.11i in which all stations and an access point share the same initial key.

21.Virtual Private Network

A network that uses the Internet or a wireless network with added security for data transmission.

25. Multiple Input/Multiple Output (MIMO)

A radio transmission method that sends several signals simultaneously in a single radio channel.

15. Passphrase

A series of words used to generate a key.

10. Channels

A small frequency range that is a subdivision of a service band.

28. Personal Area Network (PAN)

A small wireless network used by a single person.

9. What is a PAN?

A small wireless network used by a single person.

9. Service Bands

A subdivision of the frequency spectrum, dedicated to a specific service such as FM radio or cellular telephone service.

35. Radio Frequency (RFID)

A tag that can be read at a distance by a radio transmitter/receiver.

18. Spread Spectrum Transmission

A type of radio transmission that takes the original signal and spreads the signal energy over a much broader channel than would be used in normal radio transmission; used in order to reduce propagation problems, not for security.

26. Decibels (dB)

A way of expressing the ratio between two power levels, P1 and P2, on a logarithmic basis.

4. Wired Equivalent Privacy (WEP)

A weak security mechanism for 802.11

27. Bluetooth

A wireless networking standard cre- ated for personal area networks

6. WPA2

AKA 802.11i supported by all access points and wireless clients today, is the dominant (and most secure) wireless security standard

13. What is backwards compatibility?

Able to work with all earlier versions of a standard or technology.

15. Licensed Service bands

Able to work with all earlier versions of a standard or technology.

28. backward compatibility

Able to work with all earlier versions of a standard or technology.

7. Dish Antenna

An antenna that points in a particular direction, allowing it to send stronger outgoing signals in that direction for the same power and to receive weaker incoming signals from that direction.

6. Omnidirectional Antenna

An antenna that transmits signals in all directions and receives incoming signals equally well from all directions.

32. Bluetooth Profiles

An application layer standard designed to allow devices to work together automatically, with little or no user intervention.

11. What is Bluetooth profiles?

An application layer standard designed to allow devices to work together auto- matically, with little or no user intervention.

12. Pre-Shared Key

An application layer standard designed to allow devices to work together auto- matically, with little or no user intervention.

14. Session Key

An application layer standard designed to allow devices to work together auto- matically, with little or no user intervention.

13. Broadband channels

An application layer standard designed to allow devices to work together auto-matically, with little or no user intervention.

19. Rogue Access Point

An unauthorized access point.

20. Evil Twin Attack

Attacker access point outside a building that attracts clients inside the building to associate with it.

1. Drive-by Hacker

Attacker outside a corporate building who hacks into the site through an access router, thus bypassing the site firewall.

Site surveys should be done ________. A. after the initial provisional placement of access points B. periodically afterwards C. both A and B D. neither A nor B

C. both A and B

What initial authentication mode does 802.11i use? A. 802.1X B. PSK C. both A and B D. neither A nor B

C. both A and B

Which of the following is a risk in 802.11i PSK mode? A. Unauthorized sharing of the pre-shared key. B. A weak passphrase may be selected. C. both A and B D. neither A nor B

C. both A and B

Which of the following is an ad hoc networking protocol? A. Zigbee B. Z-Wave C. both A and B D. neither A nor B

C. both A and B

The mandatory method for media access control; listened to traffic, uses listening to control how multiple hosts can access the network, attempts to avoid two devices transmitting simultaneously, receiver immediately sends an acknowledgment if message is received correctly with no wait.

CMSA/CA +ACK

The 802.11 standard has two mechanisms for media access control. One of the two, _________ is reliable, mandatory, and more efficient and faster.

CSMA/CA+ACK

34. Near Field Communication (NFC)

Form of radio transmission in which devices within about 4 cm (roughly 2 in.) can communicate peer-to-peer.

802.3 Standards

IEEE working group creates Ethernet standard. Ethernet networks are single networks so it uses standards at the physical layer and the data link layer. This working group is constantly creating new and faster physical layer standards as electronics improve and is highly secured.

802.11 Standards

IEEE working group creates the wireless LAN standards. Is a set of physical layer specifications and media access control for implementing wireless. Certified by the Wi-Fi logo only when they confirm to certain standards of interoperability but it is less secured

31. Piconet

In Bluetooth, a personal area network with up to eight devices.

9. Enterprise Mode

In WPA and 802.11i, operating mode that uses 802.1X.

26. Beamforming

In radio transmission, directing energy toward a wireless device without using a dish antenna.

22. Site Survey

In wireless LANs, a radio survey to help determine where to place access points.

17. Co-Channel Interference

In wireless transmission, interference between two devices transmitting simultaneously in the same channel.

a radio transmission method that since several signals simultaneously in a single radio channel

MIMO

6. What is the role of a VPN in evil twin attacks?

Main way to prevent Man-in-the-Middle attacks: establish a Virtual Private Network (VPN) connection between the wireless client and server host is a cryptographically secure connection all the way between a client and server

The process of controlling when stations transmit

Media Access Control

________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time.

Media access control

using MIMO to send Wi-Fi frames to multiple hosts simultaneously in a single radio channel

Multiple MIMO

20. Service Set ID (SSID)

On a wireless access point, the name of the network.

4. Hertz

One cycle per second, a measure of frequency.

25. Milliwatts (mW)

One thousandth of a watt.

A group of devices on a desk that communicate wirelessly is called a ________.

PAN

36. Wi-Fi Direct

Standard that permits direct trans- mission between two 802.11 devices without using an access point.

3. Frequency

The number of complete cycles a radio wave goes through per second. In sound, frequency corresponds to pitch.

23. Rated Speed

The official standard speed of a technology.

5. Wavelength

The physical distance between comparable points (e.g., from peak to peak) in successive cycles of a wave.

40. BYOD

The practice of employees using personal devices such as laptops, cellular phones, and tablets for business purposes. BYOD reduces device cost to the firm, but it creates security issues.

8. Discuss the difference between 2.4 GHz and 5 GHz.

The primary differences between the 2.4 GHz and 5GHz wireless frequencies are range and bandwidth. 5GHz provides faster data rates at a shorter distance. 2.4GHz offers coverage for farther distances, but may perform at slower speeds.

22. Media Access Control (MAC)

The process of controlling when stations transmit; also, the lowest part of the data link layer, defining functionality specific to a particular LAN technology.

8. Frequency Spectrum

The range of all possible frequencies from zero hertz to infinity.

12. Channel Bandwidth

The range of frequencies in a channel; determined by subtracting the lowest frequency from the highest frequency.

11. Signal Bandwidth

The range of frequencies in a signal, determined by subtracting the lowest frequency from the highest frequency.

24. Throughput

The transmission speed that users actually get. Usually lower than a transmission system's rated speed.

29. Wi-Fi Alliance

Trade group created to create interoperability tests of 802.11 LANs; actually produced the WPA standard.

29. One to One Connections

Transmission from one host to another. Unicasting.

6. Distinguish between frequency spectrum, service bands, and channels.

While talking about the w ireless communication, the term frequency is used frequently. There might be several frequencies that can be used to carry the signal. All of these frequencies are the part of a set. This set that contains all the frequencies from 0 to infinity is called the frequency spectrum . The Frequency spectrum is divided into contiguous ranges of frequencies for the purpose of convenience. These ranges are dedicated to some specific services. These ranges are called the service bands. This makes it possible for that service to communicate without any problem. The examples are various radio frequencies like FM radio, emergency services and various others. Channels are service bands divided into smaller frequency ranges. This is done so that various different signals can be sent using the same service band. Example is a television channel which has no interference with other television channels.

________ have SSIDs.

Wireless access points

When two devices communicate using NFC, how close must they be?

a few inches

What propagation problem is especially bad in moist air?

absorptive attenuation

In 802.11i, protection, confidentiality, and message integrity are provided between the client and the ________.

access point

Which of the following is usually set up by a hacker outside the building?

an evil twin access point

In Bluetooth LE, ________ provide information.

beacons

and radio transmission, directing energy toward a wireless device without using a dish antenna

beamforming

MIMO _____________. A. increases transmission speed B. increases transmission distance C. both A and B D. neither A nor B

both A and B

Wide bandwidth channels that permit high speed data transmission are known as ___________ channels.

broadband

Omnidirectional antennas

can point in any direction and can receive signals from all directions. This way they are capable of sending signals all around. Because of the broadness of signal, energy transmitted with every single is too low and that is why the signal becomes weak enough after a short distance.

If Wi-Fi supported the basic printing profile, ________.

documents could be printed without downloading drivers

A VPN provides ________.

end-to-end security

Wireless radio transmission speed is usually measured in terms of ______ which is measured in terms of ______.

frequency, hertz

Spread spectrum transmission is used in WLANs because __________ and _________.

it is required by regulators, is a more reliable transmission

IoT transmissions usually involve ________.

low transmission distances

Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz

more bandwidth

The most serious problem with wireless transmission in WLANs is ________.

multipath interference

Dish antennas

receive signals from a specific point of direction hence cannot be pointed to any direction randomly. Though the signals are not broadcasted in collaterally but due to the specific direction signal carries greater power than the signal from omnipresent antenna.That is why this antenna is good for long distance transmissions.

802.11i PSK initial authentication mode was created for ________ and 802.11i 802.1X initial authentication mode was created for ________.

residences with a single access point, corporations with multiple access points

A ________ is an unauthorized internal access point.

rogue

Wireless access points typically link wireless clients to ________.

servers on the wired network

What propagation problem becomes worse when there is a large, and dense, object between sender and receiver?

shadow zones (dead zones)

Passive RFID chips get the power needed to transmit from ________.

the electricity that always flows through the air in small quantities

In general, the fewer the channels, ________.

the greater the likelihood of interference between access points

the transmission speed that the users actually get

throughput

WLANS normally use ________ because they allow greater flexibility.

unlicensed bands

In 802.1x initial authentication mode, the authenticator is the ________.

wireless access point


Kaugnay na mga set ng pag-aaral

Skeletal System - Vertebral Column and Thoracic Cage

View Set

Hypotonic, Hypertonic, & Isotonic IV Solution Quiz

View Set

CASPer: ethical q's - school/cheating/classmates/group projects

View Set

Lippincott TEST 3: Personality Disorders, Substance-Related Disorders, Anxiety Disorders, and Anxiety-Related Disorders

View Set

Psychology ch 4, 15, 16 (multi choice)

View Set

Chapter 12: Management of Patients with Oncologic Disorders

View Set

Chapter 14 Oligopoly and Strategic Behavior

View Set

Dual Enrollment Psychology Final Study Guide

View Set

Ch 13: Consideration in Contracts

View Set

Objectives for Chapters 1, 2, 4, 8, and 15 (minus Key Terms)

View Set