CIS 321 Test 2
version of 802.11 that is the fastest physical transmission standard for sale today
802.11ac
What is the strongest security protocol for 802.11 today?
802.11i
version of 802.11 WLAN standard that uses mimo and sometimes double bandwidth to achieve a rated speed of 100 megabytes per second or more and longer range then earlier speed standards
802.11n Dual Band
2. Access Point
A bridge between a wireless station and a wired LAN.
27. Multiuser MIMO
A form of MIMO in which multiple users can send and receive in the same channel simultaneously.
19. Orthogonal Frequency Division Multiplexing (OFDM)
A form of spread spectrum transmission that divides each broadband channel into subcarriers and then transmits parts of each frame in each subcarrier.
30. Master-Slave Control
Form of transmission in which one host controls the transmission of another host.
10. Personal Mode
Pre-shared Key Mode in WPA or 802.11i.
Optional method for media access control that is much less efficient
RTS
the official standard speed of a technology; advertised speed
Rated speed
16. 802.1x Mode
Security standard for both wired and wireless LANs. Mode of operation in 802.11i security.
16. Unlicensed service bands
Security standard for both wired and wireless LANs. Mode of operation in 802.11i security.
30. 802.11n
Version of the 802.11 WLAN standard that uses MIMO and sometimes doubled bandwidth to achieve a rated speed of 100 Mbps or more and longer range than earlier speed standards.
A security might use SNMP Get commands to ________ and SNMP Set commands to _______.
collect information to look for a rogue access point, change an access point's power
Wi-Fi normally uses a(n) ________.
omnidirectional antenna
Bluetooth uses ________ operation.
one-to-one
Wi-Fi direct ________ uses access points.
never
3. End to End Security
1) A layer where communication is governed directly between the transport process on the source host and the transport process on the destination host. 2) All the way from the source host to the destination host, as opposed to part of the path between the two hosts.
21. Roaming
1) In cellular telephony, the situation when a subscriber leaves a metropolitan cellular system and goes to another city or country. 2) In 802.11, when a wireless host travels from one access point to another.
14. Broadband
1) Transmission where signals are sent in wide radio channels. 2) Any high-speed transmission system.
1. At what layers do wireless LANS operate?
1. Physical Layer 2. Data Link Layer
What is the bandwidth of a channel that extends from 55 MHz to 60 MHz?
5 MHz
Wi-Fi Standards come from the ________ Working Group.
802.11
________ is among the most widely used 802.11 transmission standards used today and dominates Wi-Fi sales.
802.11ac
1. Wireless LANS (WLANs)
A local area network that uses radio transmission instead of cabling to connect devices.
11. Pre-Shared Key (PSK) Initial Mode
A mode of operation in WPA and 802.11i in which all stations and an access point share the same initial key.
21.Virtual Private Network
A network that uses the Internet or a wireless network with added security for data transmission.
25. Multiple Input/Multiple Output (MIMO)
A radio transmission method that sends several signals simultaneously in a single radio channel.
15. Passphrase
A series of words used to generate a key.
10. Channels
A small frequency range that is a subdivision of a service band.
28. Personal Area Network (PAN)
A small wireless network used by a single person.
9. What is a PAN?
A small wireless network used by a single person.
9. Service Bands
A subdivision of the frequency spectrum, dedicated to a specific service such as FM radio or cellular telephone service.
35. Radio Frequency (RFID)
A tag that can be read at a distance by a radio transmitter/receiver.
18. Spread Spectrum Transmission
A type of radio transmission that takes the original signal and spreads the signal energy over a much broader channel than would be used in normal radio transmission; used in order to reduce propagation problems, not for security.
26. Decibels (dB)
A way of expressing the ratio between two power levels, P1 and P2, on a logarithmic basis.
4. Wired Equivalent Privacy (WEP)
A weak security mechanism for 802.11
27. Bluetooth
A wireless networking standard cre- ated for personal area networks
6. WPA2
AKA 802.11i supported by all access points and wireless clients today, is the dominant (and most secure) wireless security standard
13. What is backwards compatibility?
Able to work with all earlier versions of a standard or technology.
15. Licensed Service bands
Able to work with all earlier versions of a standard or technology.
28. backward compatibility
Able to work with all earlier versions of a standard or technology.
7. Dish Antenna
An antenna that points in a particular direction, allowing it to send stronger outgoing signals in that direction for the same power and to receive weaker incoming signals from that direction.
6. Omnidirectional Antenna
An antenna that transmits signals in all directions and receives incoming signals equally well from all directions.
32. Bluetooth Profiles
An application layer standard designed to allow devices to work together automatically, with little or no user intervention.
11. What is Bluetooth profiles?
An application layer standard designed to allow devices to work together auto- matically, with little or no user intervention.
12. Pre-Shared Key
An application layer standard designed to allow devices to work together auto- matically, with little or no user intervention.
14. Session Key
An application layer standard designed to allow devices to work together auto- matically, with little or no user intervention.
13. Broadband channels
An application layer standard designed to allow devices to work together auto-matically, with little or no user intervention.
19. Rogue Access Point
An unauthorized access point.
20. Evil Twin Attack
Attacker access point outside a building that attracts clients inside the building to associate with it.
1. Drive-by Hacker
Attacker outside a corporate building who hacks into the site through an access router, thus bypassing the site firewall.
Site surveys should be done ________. A. after the initial provisional placement of access points B. periodically afterwards C. both A and B D. neither A nor B
C. both A and B
What initial authentication mode does 802.11i use? A. 802.1X B. PSK C. both A and B D. neither A nor B
C. both A and B
Which of the following is a risk in 802.11i PSK mode? A. Unauthorized sharing of the pre-shared key. B. A weak passphrase may be selected. C. both A and B D. neither A nor B
C. both A and B
Which of the following is an ad hoc networking protocol? A. Zigbee B. Z-Wave C. both A and B D. neither A nor B
C. both A and B
The mandatory method for media access control; listened to traffic, uses listening to control how multiple hosts can access the network, attempts to avoid two devices transmitting simultaneously, receiver immediately sends an acknowledgment if message is received correctly with no wait.
CMSA/CA +ACK
The 802.11 standard has two mechanisms for media access control. One of the two, _________ is reliable, mandatory, and more efficient and faster.
CSMA/CA+ACK
34. Near Field Communication (NFC)
Form of radio transmission in which devices within about 4 cm (roughly 2 in.) can communicate peer-to-peer.
802.3 Standards
IEEE working group creates Ethernet standard. Ethernet networks are single networks so it uses standards at the physical layer and the data link layer. This working group is constantly creating new and faster physical layer standards as electronics improve and is highly secured.
802.11 Standards
IEEE working group creates the wireless LAN standards. Is a set of physical layer specifications and media access control for implementing wireless. Certified by the Wi-Fi logo only when they confirm to certain standards of interoperability but it is less secured
31. Piconet
In Bluetooth, a personal area network with up to eight devices.
9. Enterprise Mode
In WPA and 802.11i, operating mode that uses 802.1X.
26. Beamforming
In radio transmission, directing energy toward a wireless device without using a dish antenna.
22. Site Survey
In wireless LANs, a radio survey to help determine where to place access points.
17. Co-Channel Interference
In wireless transmission, interference between two devices transmitting simultaneously in the same channel.
a radio transmission method that since several signals simultaneously in a single radio channel
MIMO
6. What is the role of a VPN in evil twin attacks?
Main way to prevent Man-in-the-Middle attacks: establish a Virtual Private Network (VPN) connection between the wireless client and server host is a cryptographically secure connection all the way between a client and server
The process of controlling when stations transmit
Media Access Control
________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time.
Media access control
using MIMO to send Wi-Fi frames to multiple hosts simultaneously in a single radio channel
Multiple MIMO
20. Service Set ID (SSID)
On a wireless access point, the name of the network.
4. Hertz
One cycle per second, a measure of frequency.
25. Milliwatts (mW)
One thousandth of a watt.
A group of devices on a desk that communicate wirelessly is called a ________.
PAN
36. Wi-Fi Direct
Standard that permits direct trans- mission between two 802.11 devices without using an access point.
3. Frequency
The number of complete cycles a radio wave goes through per second. In sound, frequency corresponds to pitch.
23. Rated Speed
The official standard speed of a technology.
5. Wavelength
The physical distance between comparable points (e.g., from peak to peak) in successive cycles of a wave.
40. BYOD
The practice of employees using personal devices such as laptops, cellular phones, and tablets for business purposes. BYOD reduces device cost to the firm, but it creates security issues.
8. Discuss the difference between 2.4 GHz and 5 GHz.
The primary differences between the 2.4 GHz and 5GHz wireless frequencies are range and bandwidth. 5GHz provides faster data rates at a shorter distance. 2.4GHz offers coverage for farther distances, but may perform at slower speeds.
22. Media Access Control (MAC)
The process of controlling when stations transmit; also, the lowest part of the data link layer, defining functionality specific to a particular LAN technology.
8. Frequency Spectrum
The range of all possible frequencies from zero hertz to infinity.
12. Channel Bandwidth
The range of frequencies in a channel; determined by subtracting the lowest frequency from the highest frequency.
11. Signal Bandwidth
The range of frequencies in a signal, determined by subtracting the lowest frequency from the highest frequency.
24. Throughput
The transmission speed that users actually get. Usually lower than a transmission system's rated speed.
29. Wi-Fi Alliance
Trade group created to create interoperability tests of 802.11 LANs; actually produced the WPA standard.
29. One to One Connections
Transmission from one host to another. Unicasting.
6. Distinguish between frequency spectrum, service bands, and channels.
While talking about the w ireless communication, the term frequency is used frequently. There might be several frequencies that can be used to carry the signal. All of these frequencies are the part of a set. This set that contains all the frequencies from 0 to infinity is called the frequency spectrum . The Frequency spectrum is divided into contiguous ranges of frequencies for the purpose of convenience. These ranges are dedicated to some specific services. These ranges are called the service bands. This makes it possible for that service to communicate without any problem. The examples are various radio frequencies like FM radio, emergency services and various others. Channels are service bands divided into smaller frequency ranges. This is done so that various different signals can be sent using the same service band. Example is a television channel which has no interference with other television channels.
________ have SSIDs.
Wireless access points
When two devices communicate using NFC, how close must they be?
a few inches
What propagation problem is especially bad in moist air?
absorptive attenuation
In 802.11i, protection, confidentiality, and message integrity are provided between the client and the ________.
access point
Which of the following is usually set up by a hacker outside the building?
an evil twin access point
In Bluetooth LE, ________ provide information.
beacons
and radio transmission, directing energy toward a wireless device without using a dish antenna
beamforming
MIMO _____________. A. increases transmission speed B. increases transmission distance C. both A and B D. neither A nor B
both A and B
Wide bandwidth channels that permit high speed data transmission are known as ___________ channels.
broadband
Omnidirectional antennas
can point in any direction and can receive signals from all directions. This way they are capable of sending signals all around. Because of the broadness of signal, energy transmitted with every single is too low and that is why the signal becomes weak enough after a short distance.
If Wi-Fi supported the basic printing profile, ________.
documents could be printed without downloading drivers
A VPN provides ________.
end-to-end security
Wireless radio transmission speed is usually measured in terms of ______ which is measured in terms of ______.
frequency, hertz
Spread spectrum transmission is used in WLANs because __________ and _________.
it is required by regulators, is a more reliable transmission
IoT transmissions usually involve ________.
low transmission distances
Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz
more bandwidth
The most serious problem with wireless transmission in WLANs is ________.
multipath interference
Dish antennas
receive signals from a specific point of direction hence cannot be pointed to any direction randomly. Though the signals are not broadcasted in collaterally but due to the specific direction signal carries greater power than the signal from omnipresent antenna.That is why this antenna is good for long distance transmissions.
802.11i PSK initial authentication mode was created for ________ and 802.11i 802.1X initial authentication mode was created for ________.
residences with a single access point, corporations with multiple access points
A ________ is an unauthorized internal access point.
rogue
Wireless access points typically link wireless clients to ________.
servers on the wired network
What propagation problem becomes worse when there is a large, and dense, object between sender and receiver?
shadow zones (dead zones)
Passive RFID chips get the power needed to transmit from ________.
the electricity that always flows through the air in small quantities
In general, the fewer the channels, ________.
the greater the likelihood of interference between access points
the transmission speed that the users actually get
throughput
WLANS normally use ________ because they allow greater flexibility.
unlicensed bands
In 802.1x initial authentication mode, the authenticator is the ________.
wireless access point