12.5-6_Channel Management Flashcards
(30 cards)
Wireless LAN devices have transmitters and receivers tuned to specific frequencies of radio waves to communicate. A common practice is for frequencies to be allocated as___. Such ***are then split into smaller ranges called ___.
ranges
channels
Frequency Channel Saturation
This is a modulation technique designed to spread a signal over a larger frequency band. Spread spectrum techniques were developed during war time to make it more difficult for enemies to intercept or jam a communication signal.
Direct-Sequence Spread Spectrum (DSSS)
Frequency Channel Saturation
__: This relies on spread spectrum methods to communicate. It transmits radio signals by rapidly switching a carrier signal among many frequency channels.
Frequency-Hopping Spread Spectrum (FHSS)
With the FHSS, the sender and receiver must be synchronized to “know” which channel to jump to
Frequency Channel Saturation
__: This is a subset of frequency division multiplexing in which a single channel uses multiple sub-channels on adjacent frequencies.
Orthogonal Frequency-Division Multiplexing (OFDM)
Sub-channels in an OFDM system are precisely _____to one another which allow the sub-channels to overlap without interfering
orthogonal
The new 802.11ax uses a variation of OFDM called ____
Orthogonal frequency-division multiaccess (OFDMA).
A best practice for WLANs requiring multiple APs is to use __ channels.
non-overlapping
When planning the location of APs, the ___ is important
approximate circular coverage area
Plan a WLAN Deployment
If APs are to use existing wiring or if there are locations where APs cannot be placed, note these locations on the ___
map
Plan a WLAN Deployment
Note all potential sources of___which can include microwave ovens, wireless video cameras, fluorescent lights, motion detectors, or any other device that uses the 2.4 GHz range.
interference
Plan a WLAN Deployment
Position APs ___ (below/ above) obstructions.
above
Plan a WLAN Deployment
Position APs _____(horizontally/ vertically) near the ceiling in the center of each coverage area, if possible.
vertically
Plan a WLAN Deployment
Position APs in locations where__are expected to be. For example, conference rooms are typically a better location for APs than a hallway.
users
Plan a WLAN Deployment
If an IEEE 802.11 network has been configured for mixed mode, the wireless clients may experience __than normal speeds in order to support the older wireless standards.
slower
Wireless networks are specifically susceptible to several threats, including:
__: Wireless data should be encrypted to prevent it from being read by eavesdroppers.
Interception of data
Wireless networks are specifically susceptible to several threats, including:
__: Unauthorized users attempting to access network resources can be deterred through effective authentication techniques.
Wireless Intruders
Wireless networks are specifically susceptible to several threats, including:
__: Access to WLAN services can be compromised either accidentally or maliciously. Various solutions exist depending on the source of the DoS attack.
Denial of Service (DoS) Attacks
Wireless networks are specifically susceptible to several threats, including:
___: Unauthorized APs installed by a well-intentioned user or for malicious purposes can be detected using management software.
Rogue APs
Wireless DoS attacks can be the result of:
__: Configuration errors can disable the WLAN. For instance, an administrator could accidently alter a configuration and disable the network, or an intruder with administrator privileges could intentionally disable a WLAN.
Improperly configured devices
Wireless DoS attacks can be the result of:
___: Their goal is to disable the wireless network completely or to the point where no legitimate device can access the medium.
A malicious user intentionally interfering with the wireless communication
Wireless DoS attacks can be the result of:
___: WLANs are prone to interference from other wireless devices including microwave ovens, cordless phones, baby monitors, and more, as shown in the figure.
Accidental interference
The ___ (2.4 GHz/ 5GHZ) band is more prone to interference than the___ (2.4 GHz/ 5GHZ) band.
2.4 GHZ
5 GHZ
A___ is an AP or wireless router that has been connected to a corporate network without explicit authorization and against corporate policy
rogue AP
TRUE OR FALSE
Anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network resource.
True