2.9 LAN GUI Configuration Flashcards

Interpret the wireless LAN GUI configuration for client connectivity, such as WLAN creation, security settings, QoS profiles, and advanced settings. (24 cards)

1
Q

Define:

BSSID

(Basic Service Set Identifier)

A

The MAC address of a wireless access point (AP).

Each AP has a unique BSSID, which differentiates it from other APs even if they share the same SSID.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What happens when an SSID is set to “hidden” in WLAN settings?

A

Clients must manually enter the SSID to connect.

Hidden SSIDs don’t appear in scans but are still detectable via network sniffing tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank:

The process of selecting the best Wi-Fi channel is called ______ ______ ______.

A

Dynamic Channel Selection

(DCS)

DCS reduces interference by automatically picking the least congested channel.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why should you set the correct country code in WLAN?

A

To comply with regulations.

Different countries have limits on frequency use and power levels for wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does WPA2-PSK stand for?

A

Wi-Fi Protected Access 2 - Pre-Shared Key

This uses a shared passphrase for authentication; common in home and small office networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False:

WPA3 is more secure than WPA2.

A

True

WPA3 uses Simultaneous Authentication of Equals (SAE) to prevent brute-force attacks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What happens when MAC filtering is enabled?

A

Only approved MAC addresses can connect.

This adds a layer of security but can be bypassed since MAC addresses can be spoofed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Define:

802.1X authentication

A

A network access control framework.

802.1X uses a RADIUS server to authenticate users, often in enterprise networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List three common WLAN security modes.

A
  1. Open (No Security)
  2. WPA2-PSK (Pre-Shared Key)
  3. WPA2/WPA3-Enterprise (802.1X)

WPA3-Enterprise offers enhanced security with stronger encryption and authentication.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Wi-Fi Multimedia?

(WMM)

A

A feature that prioritizes traffic.

WMM improves performance for voice, video, best-effort, and background traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is Quality of Service (QoS) important?

A

It prioritizes critical applications.

Ensures VoIP, video streaming, and gaming have stable connections without lag.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a QoS profile in WLAN configuration?

A

A set of rules that prioritizes different types of network traffic.

This ensures critical applications get the necessary bandwidth.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the four common WLAN QoS profiles?

A
  1. Voice
  2. Video
  3. Best Effort
  4. Background

Voice: Highest priority (VoIP)

Video: High priority (Streaming)

Best Effort: Normal priority (General traffic)

Background: Lowest priority (Non-urgent tasks)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What happens when a WLAN QoS profile is set to “Best Effort”?

A

Traffic is treated with normal priority.

Best Effort is the default profile in most networks, meaning data is transmitted as bandwidth allows without prioritization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

True or False:

The “Background” QoS profile is used for high-priority applications.

A

False

The Background profile is for non-essential traffic like system updates or downloads, ensuring critical applications remain unaffected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Fill in the blank:

The protocol that reserves bandwidth for real-time applications is ________.

A

IEEE 802.11e

This standard improves network efficiency by prioritizing delay-sensitive traffic.

17
Q

What happens when bandwidth management is applied?

A

It limits speed per user/device.

This prevents congestion by ensuring fair bandwidth distribution among multiple clients.

18
Q

True or False:

Traffic shaping prioritizes packets based on application type.

A

True

Traffic shaping regulates bandwidth to ensure smoother network performance.

19
Q

What is Fast Roaming (802.11r) in WLAN settings?

A

A feature that allows seamless transition between APs for mobile users.

This reduces authentication time to prevent connection drops in enterprise environments.

20
Q

Define:

Client Isolation

A

A security feature that blocks device-to-device communication.

This is often used in guest networks to prevent security risks from unauthorized access.

21
Q

What is the use of band steering?

A

To shift devices to 5 GHz.

Band steering reduces congestion on the 2.4 GHz band and improves speed and stability.

22
Q

List three factors affecting Wi-Fi performance.

A
  1. Signal interference
  2. Number of devices per AP
  3. Channel congestion

Signal Interference: Disruptions from other devices.

Number of Devices per AP: More devices mean shared bandwidth and slower speeds.

Channel Congestion: Overlapping Wi-Fi channels.

23
Q

Fill in the blank:

The process of adjusting transmit power to reduce interference is called _____ _____ _____.

A

Adaptive RF Management

(ARM)

Adaptive RF Management (ARM) optimizes wireless coverage to improve connectivity.

24
Q

What happens with excessive co-channel interference?

A

APs compete for the same frequency.

This leads to slower speeds and increased latency, degrading network performance.