3.3 Wireless Networking Flashcards

1
Q

What is good about wireless networking? [4]

A
  • (doesn’t cost anything) -don’t have to buy a bandwidth license.
  • LANs can be set up without cabling.
  • Wi-Fi can support roaming between access points so people can automatically switch between routers.
  • Setup costs are minimal (and there are various affordable options on the market.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the disadvantages of Wireless networking?

A
  • Interference (sometimes steel can cause blockages)
  • Limited Range (depending on routers)
  • WEP - not very difficult to hack encryption.
  • Access points can be used to steal data.
  • Health concerns (people believe it can cause cancer or ruin sleep patterns.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When should you use wireless networking?

A

Singular building not across buildings e.g. office building.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is wi-fi?

A
  • Also called wireless LAN (WLAN)
  • Used to connect wirelessly to a home network
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When is often wifi used?

A

Most preferred network for homes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is good about wifi?

A

Backwards Compatible with most older Wi-Fi standards.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is bad about wifi?

A

Small transmitting radius.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is WiMax? [1]

A

Worldwide Interoperability for Microwave Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

And why do people use wiMax? [3]

A
  • Designed for large distance high speed.
  • Relatively cheap method, suited for poorer countries.
  • Can be used as a wireless variant of DSL phone transmission lines.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is 3G?

A

Primary way to access internet using mobile phones.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is 3G good?

A
  • Allows the tunnelling of phone lines. (Don’t have to switch back to phone network to receive a call)
  • Fast.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the parts of Wireless security?

A

CIA Triad
1. Confidentiality
2. Integrity
3. Avalibality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why are security systems hard? [4]

A
  • Cannot plan for every eventuality
  • The “arms race”
  • Systems can unravel from a weak point.
  • Users messing it up.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the three types of authentication?

A
  • One factor authentication. - something you know (password)
  • Two factor authentication. - something you have (card) + above
  • Three factor authentication. - something you are (finger print) + above + above
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are firewalls and what do they do?

A
  • Hardware or Software (or hybrid)
  • Controls incoming and outgoing network traffic.
  • Analyse data packets based on pre-determined yes and nos.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is a MAC address?

A

Media Access Control
Used to identify hardware

17
Q

Examples of physical security?

A
  • Locked doors
  • Security personnel
  • Cages / sealed units
  • Reinforced / secure rooms
  • Walls with barbed wire
  • Guard dogs?
18
Q

Advantages of UserID [2]

A
  • Access rights can be set for each user.
  • User groups can be created to manage rights in batches.
19
Q

Disadvantages of UserID

A
  • UserID can be stolen
  • System can be bypassed.
  • Does not protect against messages in the network.
  • People will mes it up.
20
Q

Advantages of Encryption

A
  • Strong encryption is hard to break.
  • Computers are fast enough to encrypt data on the fly.
21
Q

Disadvantages of Encryption?

A
  • Users create stupid\easy passwords
  • Password needs to be transmitted allowing the receiver to read the message.
  • Some encryptions have backdoors.