1.6
What is EAP-TLS?
-Install a certificate on both the authentication server and the client -An authentication server pair of keys and a client pair of keys needs to be generated first, signed using PKI, and installed on the devices. -On the station side, the keys can be issued for the machine itself and/or for the user.
What are the non-overlapping channels in the 2.4GHz range?
1,6, and 11
What much should APs overlap in a network?
10 percent or more
What is the theoretical maximum data transfer rate of the 802.11b standard?
11Mbps
How many channels are available in the 2.4GHz range?
14
What is the maximum data rate transmission of the 802.11ac standard?
1Gbps
What frequncy does the 802.11n standard use?
2.4GHz and 5 GHz
What band does 802.11b use to transmit data?
2.4Ghz
What frequency does the 802.11g standard use?
2.4Ghz
How wide are the 2.4GHz channels?
22MHz
How many channels did the 802.11h standard use?
23 non-overlapping 5GHz channels
How many channels are offered in the 802.11a 5GHz band?
23 non-overlapping channels
What is the theoretical maximum data transfer rate of the 802.11n standard?
250 Mbps or 500 Mbps
What is the theoretical maximum transfer distance of the 802.11g standard?
300 ft
What is the theoretical maximum distance of the 802.11b standard?
350 feet
What size channels does the 802.11n channel use?
40 Mhz (via channel bonding)
What frequency does the 802.1ac use?
5 GHz
What is the maximum distance a 802.11 a device can transmit?
50 ft
What is the maximum theoretical data transmission rate of the 802.11g standard?
54Mbps
What is the theoretical maximum data transfer rate of a 802.11a device?
54Mbps
What frequency does the 802.11h standard use?
5GHz
What frequency range does the 802.11a use?
5Ghz
What unlicensed bands are designated for public use by the FCC?
900 MHZ, 2.4 GHz, and 5 GHz
How can you mitigate Ad hoc networks from being created on a corporate network?
A cisco unified wireless network can send out deauthentication frames to prevent ad hoc associations
What is rate shifting?
A data rate of a WAP diminishing as the host gets further away from it
What is MAC effiiciency?
A feature introduced with the 802.11n standard that allows many packets to be transmitted without an acknowledgement being sent
What is CCK?
A modulation technique supports LANs with a maximum throughout of 11Mbps. It includes a pare of codes called chipping sequences which are complementary to each others.
What is RADIUS?
A networking protocol that offers us several security benefits: authorization, centralized access, and accounting supervision regarding the users and/or computers that connect to and access our networks.
What is an omnidirectional antenna?
A point-to-multipoint antenna that provides equal power dispersion in almost all directions. It is the primary access point used with WAPs
What is a Yagi antenna?
A point-to-point antenna that is best used for point-to-point bridging of access points.
What is PKI?
A public key infrastructure (PKI) is a set of hardware, software, people, policies, and procedures needed to create, manage, distribute, use, store, and revoke digital certificates and manage public-key encryption.
What is an extended basic service set?
A service set with two or more APs
What is a wireless access point?
A wireless bridge used in a multipoint RF network.
What is management frame protection?
A wireless feature that increases the security of management frames
What is DFS (Dynamic Frequency Range Selection)?
A wireless point feature that continueously monitors a device's operating range for any radar signals that are allowed to operated in portions of the 5GHz band as well as 802.11a before transmitting
What are the two AP operating modes?
Access Point Bridging
What are tools can you use at site surveys?
AirMagnet Survey Ekahau Site Survey
What is the Client Mode management frame?
All management frames between the AP and the station are protected because clients can detect and drop spoofed or invalid management frames.
What is Access Point mode?
Allows an AP to operate as a traditional access point.
What is a basic service set?
Also known as infrastructure mode. It is a wireless network with one AP
What can be used to mitigate passive attacks?
An IPS
What is Rogue AP?
An access point not authorized to be up and running by the corporate office by the WLAN administrators of the office.
What is an Independent Basic Service Set?
An adhoc network of two or more wireless devices without an access point
What are features of TKIP?
Boosting encryption strength Serving as a WEP code wrapper and also adding pre-packet mixing of media access control (MAC) based keys and serial numbers Assigning a unique 48-bit sequencing number to each packet Utilizing the RC4 stream cipher - 128-bit encryption keys and 64-bit authentication keys.
How does the 802.11ac standard acheive such high speeds?
Channel bonding. Either 160 MHz, 80 MHz, or 40 MHz
What is CDMA?
Code Division multiple access assigns a unique code to each call or transmission and sreads the data across the spectrums, allowing a call to make use of all frequencies.
What modulation technique does the 802.11b standards use?
DSSS
What modulation technique does the 802.11g standards use?
DSSS and OFDM
What modulation technique does the 802.11n standards use?
DSSS, CCK, and OFDM
What is DSSS?
Direct Sequence Spread Spectrum. A modulation technice that creates a redundant bit pattern for each bit that is transmitted. If one or more bits in the bit pattern are damaged in transmission, the original data may be recoverable from the redundant bits.
What can cause wireless signal degradation?
Distance Walls and Other Barriers Protocols Used Interference
What is EAP?
Extensible Authentication Protocol Is not a single protocol but a frame-work for port-based access control that uses the same three components that are used in RADIUS. A wide variety of these include certificates, a PKI, or even simple passwords.
What is FDMA?
Frequency Division Multiple Access is one of the modulation techniques used in cellular wireless networks. it divides the frequency range into bands and assigns a band to each subscriber. This was used in 1G cellular networks
What is GSM?
Global System Mobile is a type of cellphone that contains a subscriber Identify Module (SIM) chip.
What is EAP-FAST?
In the first stage, a TLS tunnel is established. Unlike PEAP, however, EAP-FASTs first stage is established by using a per-shared key calles a Protection Authentication Credential (PAC). In the second stage, a series of type/length/value (TLV)-encoded data is used to carry a user authentication.
What are the steps of a WLAN site survey?
Information Gathering Predeployment Site Survey Postdeployment Site Survey
What is a way to mitigate rogue APs from connecting to a network?
Install a wireless lan controller. The APs will signal to the WLC when a new AP is added to the network
What is the MFP management frame?
It looks for management frames that aren't from known APs and sends an alert. Used to mitigate APs
What technology was introduced with the 802.11n standard?
MIMO
What is MIMO?
Multiple-Input, Multiple-Output. Several frames are sent by several antennas over several paths and are then recombined by another set of antennas to optimize throughput and multipath resistance.
What modulation technique does the 802.11a standards use?
OFDM
What modulation technique does the 802.11ac cstandards use?
OFDM
What is OFDM?
Orthogonal Frequency Division Multiplexing. A modulation technique that is implemented with a system of 52 subcarriers. This distributes that data over the 52 subcarrierrs, which are spaced at precise frequencies.
What is PPP?
Point-to-point protocol. The protocol used with dial-up connections to the Internet. its functions incloude error control, security, dynamic IP addressing, and support of multiple protocols.
What is PEAP?
Protected Extenisble Authentication Protocol Is a protocol that encapsulates the EAP within an encrypted and authenticated Transport Layer Security (TLS) tunnel. It requires only a server-side PKI certificate to create a sure TLS tunnel to protect user authentication
What is WPA?
Provides a standard for authentication and encryption of WLAN's that indented to solve known security problems. Works with PSK and TKIP/AES
What is bridging mode?
Provides a wireless bridge between two wired network segments.
What modulation technique does the 802.11ac standard use?
QAM-256
What is RSSI?
Received signal strength indication. A measurement of the power present in a received radio signal
What is goodput?
Refers to the actual data throughput, not the theorectial number that the standards describe.
What is SNR?
Signal to noise ratio. Compares the level of a desired signal to the level of backgroun noise.
What is a distribution system?
The name of the connection from a access point to a wired network
What are the first key factors to be determined during the information gathering stage of a site survey?
The scope of the network The areas that must be covered and the expected capacity The types of devices that need to be supported
What happens when you connect an 802.11b device to an 802.11g network?
The speed of the network can only be a maximum of 11 Mbps because the 802.11g downgrades to using the DSSS modulation technique instead of the Othogonal Frequency Division Multiplexing ODFM
What is an SSID?
The unique 32 character identifier that represents a particular network.
What is Request to Send, Clear to Send (RTS/CTS)?
This is a protocol that was developed to help wireless networks detect and avoid packet collisions. On these networks, the sending node first sends and RTS frame to the destination node, which sends a CTS frame in return indicating that it can continue its transmission. Upon transmission, the sending node waits for an acknowledgment that indicates the receiving node is ready for another data packet.
How many channels does the 802.11b standard use?
Three non-overlapping channels.
What is TDMA?
Time Division Multiple Access increases the speed over FDMA by dividing the channels into time slots and assigning slots to calls. This also helps to prevent eavesdropping in calls.
What is TPC?
Transmit Power control. It allows you to modify the signal strength of wireless radios
What is a passive attack?
Where someone monitors data travelling on a network and intercepts any sensitive information they find
What is PSK?
Wifi PSK or WPA-PSK is a system of encryption used to authenticate users on wireless local area networks. Data transmission is encrypted and controlled using an end user's generated password.
Is 802.11g backwards compatible with 802.11b?
Yes
How do Wireless LANs communicate?
half-duplex