3.9.2.3 Wireless Networking. Flashcards

1
Q

What is a wireless network.

A

A network that allows clients to communicate within a network without being physically connected to it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is required for a wireless network?

A

A Wireless Access Point.

A wireless network adapter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the purpose of a wireless access point?

A

Connects to a wired network just like
any other client would, and a wireless network
adapter in the device that connects to the wireless
network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is Wi-Fi?

A

Refers to a wireless local area network that is
based on international standards. This allows a
device made in one part of the world to connect seamlessly to wireless networks all over
the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of Wi-Fi?

A

Used to enable devices to connect to a network

wirelessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Outline how wireless networks are secured.

A

By encrypted transmitted data using WPA or WPA2.

Disabling SSID broadcast.

MAC address filter.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does WPA stand for?

A

Wireless Protected Access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What security does WPA provide?

A

Requires that a new wireless client enters a

password in order to connect to the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does SSID stand for?

A

Service Set Identifier.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is an SSID and how does it protect a network.

A

SSID’s are the names that identify wireless networks. Disabling SSID broadcast stops wireless devices within range of the network from displaying that the
network is available, only allowing those who know the SSID to connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How does a MAC whitelist protect a website?

A

MAC (which stands for media access control) addresses are assigned to every wireless device
by their manufacturer and are unique to that device. MAC address whitelists can be created to allow only specific devices to connect to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How does a MAC blacklist protect a website?

A

MAC address blacklists can be used to block specific devices from connecting to a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does CSMA/CA stand for?

A

Carrier sense multiple access with collision avoidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is CSMA/CA.

A

A protocol used in wireless networks to avoid

data collisions caused by multiple devices communicating simultaneously.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Outline the process of CSMA/CA.

A

When a device is ready to transmit, it listens to its communication channel to check whether it is idle. If so, then the data is transmitted. If the channel is busy, the device waits for a random
period of time before checking the channel
again. An exponential backoff algorithm can be
used to increase the time period for which the
device waits with each check of the channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Outline hidden nodes in CSMA/CA.

A

While CSMA/CA is effective at eliminating collisions in small networks, it cannot overcome hidden nodes: a problem that arises when the
device checking for an idle channel cannot “see” some parts of the network on which communication may be occurring.

17
Q

How do we get around hidden nodes?

A

To get around the problem of hidden nodes, a protocol called request to send/clear to send (or RTS/CTS) is used.

This protocol adds an
additional step into the CSMA process. Once the
transmitting device has checked whether the
channel is idle, it sends a “request to send” message to the server.

If the server is indeed idle, it will respond with a “clear to send” message at which point the transmitting device can begin communication with the server.

If no “clear to send” message is received, the server is busy communicating with a
hidden node and the transmitting device must wait
before starting the CSMA process again.