12.5-6_Channel Management Flashcards

1
Q

Wireless LAN devices have transmitters and receivers tuned to specific frequencies of radio waves to communicate. A common practice is for frequencies to be allocated as___. Such ***are then split into smaller ranges called ___.

A

ranges
channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Frequency Channel Saturation
This is a modulation technique designed to spread a signal over a larger frequency band. Spread spectrum techniques were developed during war time to make it more difficult for enemies to intercept or jam a communication signal.

A

Direct-Sequence Spread Spectrum (DSSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Frequency Channel Saturation
__: This relies on spread spectrum methods to communicate. It transmits radio signals by rapidly switching a carrier signal among many frequency channels.

A

Frequency-Hopping Spread Spectrum (FHSS)
With the FHSS, the sender and receiver must be synchronized to “know” which channel to jump to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Frequency Channel Saturation
__: This is a subset of frequency division multiplexing in which a single channel uses multiple sub-channels on adjacent frequencies.

A

Orthogonal Frequency-Division Multiplexing (OFDM)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Sub-channels in an OFDM system are precisely _____to one another which allow the sub-channels to overlap without interfering

A

orthogonal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The new 802.11ax uses a variation of OFDM called ____

A

Orthogonal frequency-division multiaccess (OFDMA).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A best practice for WLANs requiring multiple APs is to use __ channels.

A

non-overlapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When planning the location of APs, the ___ is important

A

approximate circular coverage area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Plan a WLAN Deployment
If APs are to use existing wiring or if there are locations where APs cannot be placed, note these locations on the ___

A

map

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Plan a WLAN Deployment
Note all potential sources of___which can include microwave ovens, wireless video cameras, fluorescent lights, motion detectors, or any other device that uses the 2.4 GHz range.

A

interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Plan a WLAN Deployment
Position APs ___ (below/ above) obstructions.

A

above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Plan a WLAN Deployment
Position APs _____(horizontally/ vertically) near the ceiling in the center of each coverage area, if possible.

A

vertically

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Plan a WLAN Deployment
Position APs in locations where__are expected to be. For example, conference rooms are typically a better location for APs than a hallway.

A

users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Plan a WLAN Deployment
If an IEEE 802.11 network has been configured for mixed mode, the wireless clients may experience __than normal speeds in order to support the older wireless standards.

A

slower

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Wireless networks are specifically susceptible to several threats, including:
__: Wireless data should be encrypted to prevent it from being read by eavesdroppers.

A

Interception of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless networks are specifically susceptible to several threats, including:
__: Unauthorized users attempting to access network resources can be deterred through effective authentication techniques.

A

Wireless Intruders

17
Q

Wireless networks are specifically susceptible to several threats, including:
__: Access to WLAN services can be compromised either accidentally or maliciously. Various solutions exist depending on the source of the DoS attack.

A

Denial of Service (DoS) Attacks

18
Q

Wireless networks are specifically susceptible to several threats, including:
___: Unauthorized APs installed by a well-intentioned user or for malicious purposes can be detected using management software.

A

Rogue APs

19
Q

Wireless DoS attacks can be the result of:

__: Configuration errors can disable the WLAN. For instance, an administrator could accidently alter a configuration and disable the network, or an intruder with administrator privileges could intentionally disable a WLAN.

A

Improperly configured devices

20
Q

Wireless DoS attacks can be the result of:

___: Their goal is to disable the wireless network completely or to the point where no legitimate device can access the medium.

A

A malicious user intentionally interfering with the wireless communication

21
Q

Wireless DoS attacks can be the result of:
___: WLANs are prone to interference from other wireless devices including microwave ovens, cordless phones, baby monitors, and more, as shown in the figure.

A

Accidental interference

22
Q

The ___ (2.4 GHz/ 5GHZ) band is more prone to interference than the___ (2.4 GHz/ 5GHZ) band.

A

2.4 GHZ
5 GHZ

23
Q

A___ is an AP or wireless router that has been connected to a corporate network without explicit authorization and against corporate policy

A

rogue AP

24
Q

TRUE OR FALSE
Anyone with access to the premises can install (maliciously or non-maliciously) an inexpensive wireless router that can potentially allow access to a secure network resource.

A

True

25
Q

True or False
A personal network hotspot could also be used as a rogue AP.

A

True

For example, a user with secure network access enables their authorized Windows host to become a Wi-Fi AP. Doing so circumvents the security measures and other unauthorized devices can now access network resources as a shared device.

26
Q

To prevent the installation of rogue APs, organizations must configure WLCs with___, as shown in the figure, and use monitoring software to actively monitor the radio spectrum for unauthorized APs.

A

rogue AP policies

27
Q

To minimize the risk of a DoS attack due to improperly configured devices and malicious attacks, harden all devices, keep ___ secure, create backups, and ensure that all configuration changes are incorporated off-hours.

A

passwords

28
Q

In a___ attack, the hacker is positioned in between two legitimate entities in order to read or modify the data that passes between the two parties.

A

man-in-the-middle (MITM)

29
Q

A popular wireless MITM attack is called the “___” attack, where an attacker introduces a rogue AP and configures it with the same SSID as a legitimate AP. Locations offering free Wi-Fi, such as airports, cafes, and restaurants, are particularly popular spots for this type of attack due to the open authentication.

A

evil twin AP

30
Q

Defeating an attack like an MITM attack depends on the ___of the WLAN infrastructure and the___ in monitoring activity on the network.

A

sophistication
vigilance