Chapter 8: Installing Wireless & SOHO Networks Flashcards

1
Q

Disabling your SSID broadcast makes you less susceptible to ____ ? pg. 378

A

wardriving; which is when someone drives through your neighborhood looking for a wireless signal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

T/F If security is enabled and you are using WEP, the client won’t be required to know the passphrase and WEP key to connect to the wireless router. pg. 378

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

RADIUS pg. 378

A

Remote Authentication Dial-In User Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does RADIUS offer? pr. 378

A

RADIUS provides centralized authentication on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

How many configurable channels are in the 2.4GHz range? pg. 379

A

11 with channel 6 posing as the default for 802.11b/g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the recommended overlap when setting up WAPs to have overlapping ranges? pg. 379

A

10 %

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F Channels need to be at least five numbers apart to not overlap. pg. 379

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Wireless clients are configured to ___-___ a channel by default, but can be forced to use a specific channel as well. pg. 379

A

auto-detect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

If your using your wireless router to allow one or more clients to access the Internet but you have one external public IP address, your router is using ___. pg. 379

A

NAT / Network Address Translation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In 2007, the WiFi Alliance created ___ ____ ___ as an easy way for users to set up and configure a secure wireless network. pg. 381

A

WiFi Protected Setup / WPS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

T/F By their nature, wireless routers are less secure than their wired counterparts. pg. 381

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What can you do to increase the security of your wireless installation? pg. 381

A

Disable the SSID broadcasts, Wireless encryption, MAC filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What’s the only downside to disabling your SSID broadcast? pg. 382

A

you have to configure legitimate client computers manually with the name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Always be sure your router has the most current ___. pg. 383

A

firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A ___ is a hardware or software solution that serves as your network’s Micheal….uh, security guard. pg. 383

A

firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

T/F Firewalls can protect you in three ways. pg. 383

A

False; only two from hackers and accessing undesirable content

17
Q

Some firewalls have a third network port to connect both public and private servers and this network is known as a ____ ____. pg. 384

A

demilitarized zone / DMZ

18
Q

What are two general categories of firewalls? pg. 384

A

Network based and Host based

19
Q

A ___-___ firewall is what companies use to protect their private network from public networks. pg. 384

A

network-based firewall

20
Q

T/F A host-based firewall can serve a workgroup. pg. 384

A

False; only a single machine

21
Q

The basic method of configuring firewalls is to use an ___ ___ ____. pg. 385

A

Access control list / ACL

22
Q

ACLs are typically configured to block traffic by ____? pg. 385

A

IP address, port number, domain name, or some combo of all three

23
Q

___ is essentially an automated form of port forwarding. pg. 385

A

port triggering

24
Q

What does port triggering accomplish? pg.385

A

It allows traffic to enter the network on a specific port after a computer makes an outbound request on that specific port

25
Q

___ is a strategy that allows an administrator to control resources to maintain a certain service level.

A

Quality of Service / QoS