12.5-6_Channel Management Flashcards

(30 cards)

1
Q

Wireless LAN devices have transmitters and receivers tuned to specific frequencies of radio waves to communicate. A common practice is for frequencies to be allocated as___. Such ***are then split into smaller ranges called ___.

A

ranges
channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Frequency Channel Saturation
This is a modulation technique designed to spread a signal over a larger frequency band. Spread spectrum techniques were developed during war time to make it more difficult for enemies to intercept or jam a communication signal.

A

Direct-Sequence Spread Spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Frequency Channel Saturation
__: This relies on spread spectrum methods to communicate. It transmits radio signals by rapidly switching a carrier signal among many frequency channels.

A

Frequency-Hopping Spread Spectrum (FHSS)
With the FHSS, the sender and receiver must be synchronized to “know” which channel to jump to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Frequency Channel Saturation
__: This is a subset of frequency division multiplexing in which a single channel uses multiple sub-channels on adjacent frequencies.

A

Orthogonal Frequency-Division Multiplexing (OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sub-channels in an OFDM system are precisely _____to one another which allow the sub-channels to overlap without interfering

A

orthogonal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The new 802.11ax uses a variation of OFDM called ____

A

Orthogonal frequency-division multiaccess (OFDMA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A best practice for WLANs requiring multiple APs is to use __ channels.

A

non-overlapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When planning the location of APs, the ___ is important

A

approximate circular coverage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Plan a WLAN Deployment
If APs are to use existing wiring or if there are locations where APs cannot be placed, note these locations on the ___

A

map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Plan a WLAN Deployment
Note all potential sources of___which can include microwave ovens, wireless video cameras, fluorescent lights, motion detectors, or any other device that uses the 2.4 GHz range.

A

interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Plan a WLAN Deployment
Position APs ___ (below/ above) obstructions.

A

above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Plan a WLAN Deployment
Position APs _____(horizontally/ vertically) near the ceiling in the center of each coverage area, if possible.

A

vertically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Plan a WLAN Deployment
Position APs in locations where__are expected to be. For example, conference rooms are typically a better location for APs than a hallway.

A

users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Plan a WLAN Deployment
If an IEEE 802.11 network has been configured for mixed mode, the wireless clients may experience __than normal speeds in order to support the older wireless standards.

A

slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless networks are specifically susceptible to several threats, including:
__: Wireless data should be encrypted to prevent it from being read by eavesdroppers.

A

Interception of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless networks are specifically susceptible to several threats, including:
__: Unauthorized users attempting to access network resources can be deterred through effective authentication techniques.

A

Wireless Intruders

17
Q

Wireless networks are specifically susceptible to several threats, including:
__: Access to WLAN services can be compromised either accidentally or maliciously. Various solutions exist depending on the source of the DoS attack.

A

Denial of Service (DoS) Attacks

18
Q

Wireless networks are specifically susceptible to several threats, including:
___: Unauthorized APs installed by a well-intentioned user or for malicious purposes can be detected using management software.

19
Q

Wireless DoS attacks can be the result of:

__: Configuration errors can disable the WLAN. For instance, an administrator could accidently alter a configuration and disable the network, or an intruder with administrator privileges could intentionally disable a WLAN.

A

Improperly configured devices

20
Q

Wireless DoS attacks can be the result of:

___: Their goal is to disable the wireless network completely or to the point where no legitimate device can access the medium.

A

A malicious user intentionally interfering with the wireless communication

21
Q

Wireless DoS attacks can be the result of:
___: WLANs are prone to interference from other wireless devices including microwave ovens, cordless phones, baby monitors, and more, as shown in the figure.

A

Accidental interference

22
Q

The ___ (2.4 GHz/ 5GHZ) band is more prone to interference than the___ (2.4 GHz/ 5GHZ) band.

23
Q

A___ is an AP or wireless router that has been connected to a corporate network without explicit authorization and against corporate policy

24
Q

TRUE OR FALSE
Anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network resource.

25
True or False A personal network hotspot could also be used as a rogue AP.
True For example, a user with secure network access enables their authorized Windows host to become a Wi-Fi AP. Doing so circumvents the security measures and other unauthorized devices can now access network resources as a shared device.
26
To prevent the installation of rogue APs, organizations must configure WLCs with___, as shown in the figure, and use monitoring software to actively monitor the radio spectrum for unauthorized APs.
rogue AP policies
27
To minimize the risk of a DoS attack due to improperly configured devices and malicious attacks, harden all devices, keep ___ secure, create backups, and ensure that all configuration changes are incorporated off-hours.
passwords
28
In a___ attack, the hacker is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.
man-in-the-middle (MITM)
29
A popular wireless MITM attack is called the “___” attack, where an attacker introduces a rogue AP and configures it with the same SSID as a legitimate AP. Locations offering free Wi-Fi, such as airports, cafes, and restaurants, are particularly popular spots for this type of attack due to the open authentication.
evil twin AP
30
Defeating an attack like an MITM attack depends on the ___of the WLAN infrastructure and the___ in monitoring activity on the network.
sophistication vigilance