Bits & Bytes: Week V - IV - Wireless Network Configurations, Channels, and Security) Flashcards

1
Q

This type of wireless network doesn’t typically have any network infrastructure. Nodes within range all speak directly to each other.

A

Ad-hoc Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sharing data between smartphones, communication between equipment in a warehouse, and communication during a disaster event are examples of when __ _________ network might be used.

A

Ad-hoc network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the most common type of wireless network used in business settings?

A

A WLAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

ACRONYM:

WLAN

A

Wireless Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This type of wireless network consists of mostly wireless access points which are connected to a wired network wirelessly.

A

a Mesh Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Individual, smaller sections of the overall frequency band used by a wireless network

A

Channels

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What 3 channels never overlap on n 802.11b network?

A

Channels 1, 6, and 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

If a channel operates at 2412 megahertz and has a width of 22 megahertz, what are its range of frequencies?

A

2401 - 2423 megahertz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ACRONYM:

WEP

A

Wired Equivalent Technology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is a wireless encryption technology that only provides a very low level of privacy?

A

Wired Equivalent Technology provides as much security as sending unencrypted data over a wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In data encryption, what correlates with a higher level of security?

A

Longer keys (or more bits)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many bits is in a WEP encryption key?

A

40 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ACRONYM:

WPA

A

WiFi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How many bits are in a WPA encryption key?

A

128 bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the most commonly used encryption algorithm for wireless networks?

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How many bits are in a WPA2 encryption key?

A

256 bits

17
Q

Configuring WAPs to only allow for connections from a specific set of trusted MAC addresses is known as what?

A

MAC filtering

18
Q

What’s another term for cellular networking?

A

Mobile networking

19
Q

What is a major difference between cellular and wifi signals?

A

Cellular signals can travel over much longer distances more easily.

20
Q

This protocol is an interoperable, wireless, Radio Frequency (RF)-based communications technology designed specifically for control, monitoring and status reading applications in residential and light commercial environments

A

Z-Wave Protocol

21
Q

This wireless protocol is the only complete loT solution, from the mesh network to the universal language that allows smart objects to work together

A

Zigbee Protocol

22
Q

This wireless protocol is built for the complexities of the IoT, addressing challenges such as interoperability, security, power, and architecture requirements. It is a low-power wireless mesh networking protocol based on the universally supported Internet Protocol (IP), and built using open and proven standards.

A

Thread Protocol