Ch4 Flashcards

(99 cards)

1
Q

What does WLAN stand for?

A

Wireless Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary benefit of WLAN?

A

Increased mobility and flexibility for network users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What device acts as a central node to connect wireless devices to a network?

A

Access Point (AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the two main types of access points?

A

Autonomous (standalone) and Controller-based APs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What does BSS stand for in wireless networking?

A

Basic Service Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What element connects multiple BSSs into an ESS?

A

Distribution System (DS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What does ESS stand for?

A

Extended Service Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an SSID?

A

Service Set Identifier (network name broadcast by an AP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How can MAC address filtering improve wireless security?

A

By allowing only specified MAC addresses to connect

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is Ad‑Hoc mode also known as?

A

Independent BSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

In which mode do clients communicate via an AP?

A

Infrastructure mode (BSS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What protocol encapsulates traffic between APs and a wireless LAN controller?

A

CAPWAP protocol (Control And Provisioning of Wireless
Access Points)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which protocol carries EAP packets in wireless authentication?

A

RADIUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does WEP stand for?

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why is WEP considered insecure?

A

It creates detectable patterns and can be easily broken

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What encryption protocol replaced WEP in WPA?

A

TKIP (Temporal Key Integrity Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What key length does WPA’s TKIP use?

A

256‑bit keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which encryption standard is used by WPA2?

A

AES (Advanced Encryption Standard)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What authentication mechanism does WPA2 use?

A

CCMP (Cipher Block Chaining Message Authentication Code Protocol)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

How many steps are in the WPA2 4‑WAY handshake?

A

Four

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What new handshake protocol does WPA3 use?

A

SAE (Simultaneous Authentication of Equals)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is a Honeypot AP?

A

A fake AP meant to lure clients for attack attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a Rogue AP?

A

An unauthorized AP installed on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What happens in node replication attacks?

A

Captured nodes are reprogrammed to eavesdrop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is MAC Spoofing?
Changing a device’s MAC address to impersonate another
26
Name two passive wireless attacks.
Traffic analysis and eavesdropping
27
What type of attack floods a wireless network to disrupt service?
DoS attack
28
Why segment a wireless LAN?
To apply different access rules for stronger security
29
What are the three components of AAA in wireless security?
Authentication, Authorization, Accounting
30
Name two modern wireless encryption protocols.
WPA2 and WPA3
31
What does IPSec provide for transmitted packets?
Confidentiality, integrity, and authenticity
32
What does AH stand for in IPSec?
Authentication Header
33
What does ESP stand for in IPSec?
Encapsulation Security Payload
34
What key exchange protocol is used by IPSec?
IKE (Internet Key Exchange)
35
Which IPSec mode protects only the IP payload?
Transport Mode
36
Which IPSec mode encapsulates the entire IP packet?
Tunnel Mode
37
Give one advantage of IPSec.
1. Strong security 1. Scalability 1. Interoperability 1. Improved network performance
38
Give one disadvantage of IPSec (NO NEED)
Configuration complexity
39
What increases administrative overhead but provides stronger access control than SSID alone?
MAC address filtering
40
What must be removed to harden an AP?
Default SSID and default passwords
41
Which protocol is used as a fallback in WPA2 for devices not supporting AES?
TKIP
42
What does CAPWAP stand for?
Control And Provisioning of Wireless Access Points
43
In the context of WLAN, what is a Station?
Any device that has the capability to use 802.11protocol. E.g. Laptop, mobile phone
44
Why is AES preferred over TKIP?
Stronger encryption and larger key size
45
What does CCMP stand for?
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol
46
What is the main goal of Wireless Security?
To prevent unauthorized access and protect data confidentiality
47
Which handshake does WPA3 replace from WPA2?
PSK 4‑WAY handshake
48
What type of AP configuration is automatically managed by a WLC?
Controller‑based AP
49
What organization’s recommendations can be used for AP hardening?
CIS (Center for Internet Security)
50
What encapsulation transport does CAPWAP use?
UDP tunnels for control and data
51
What layer of the OSI model does WLAN operate on?
Data Link Layer (Layer 2)
52
What IEEE standard defines Wi‑Fi?
IEEE 802.11
53
Which 802.11 amendment introduced mesh networking?
802.11s
54
What 802.11 standard first introduced 54 Mbps data rates?
802.11a
55
What frequency bands do 802.11b/g/n use?
2.4 GHz
56
What frequency bands do 802.11a/ac use?
5 GHz
57
What modulation technique does 802.11g use?
OFDM (Orthogonal Frequency-Division Multiplexing)
58
What does CSMA/CA stand for?
Carrier Sense Multiple Access with Collision Avoidance
59
What is the purpose of the RTS/CTS mechanism?
To reduce collisions in a busy WLAN
60
What is a beacon frame in Wi‑Fi?
A management frame broadcast by AP to announce presence
61
What is a probe request in Wi‑Fi?
Frame sent by client to discover nearby SSIDs
62
What is a probe response in Wi‑Fi?
Frame sent by AP in reply to probe request
63
What is the default maximum range for 2.4 GHz Wi‑Fi?
Approximately 100–150 feet indoors
64
What is the default maximum range for 5 GHz Wi‑Fi?
Approximately 50–70 feet indoors
65
What is co‑channel interference?
Interference from multiple APs using the same channel
66
What is adjacent‑channel interference?
Interference from APs using overlapping channels
67
What tool is commonly used for Wi‑Fi site surveys?
Ekahau or AirMagnet
68
What is a site survey in WLAN planning?
Analysis of coverage, interference, and capacity
69
What is the purpose of directional antennas?
To focus RF energy in a specific direction
70
What is MIMO?
Multiple Input Multiple Output
71
How does MIMO improve throughput?
By using multiple spatial streams
72
What does beamforming do?
Focuses Wi‑Fi signal toward a specific client
73
What is 802.11ax also known as?
Wi‑Fi 6
74
What new technology does Wi‑Fi 6 introduce for dense environments?
OFDMA (Orthogonal Frequency-Division Multiple Access)
75
What is BSSID?
Basic Service Set Identifier, the MAC of the AP radio
76
What is fast roaming in enterprise WLAN?
802.11r
77
What security feature does 802.11w provide?
Protected Management Frames (PMF)
78
What is captive portal authentication?
Web‑based login before granting full network access
79
What is the difference between WPA2‑Enterprise and WPA2‑PSK?
Enterprise uses RADIUS; PSK uses a shared key
80
What is a dynamic PSK?
Per‑user pre-shared keys centrally managed by a controller
81
What protocol is used for passphrase to PMK derivation in WPA/WPA2?
PBKDF2
82
What is a PMK in 802.11 security?
Pairwise Master Key
83
What is a PTK in 802.11 security?
Pairwise Transient Key
84
What is a GTK in 802.11 security?
Group Temporal Key
85
What is KRACK?
Key Reinstallation Attack against WPA2
86
What is the function of a RADIUS server?
Centralized authentication and accounting
87
What port does RADIUS authentication use by default?
UDP 1812
88
What port does RADIUS accounting use by default?
UDP 1813
89
What is Tacacs+?
Cisco’s proprietary AAA protocol
90
What is wireless intrusion prevention system (WIPS)?
Real‑time detection and blocking of rogue APs
91
What metric measures signal strength?
RSSI (Received Signal Strength Indicator)
92
What metric measures noise level?
SNR (Signal-to-Noise Ratio)
93
What does DFS stand for in Wi‑Fi?
Dynamic Frequency Selection
94
Why is DFS required in 5 GHz?
To avoid interfering with radar systems
95
What is airtime fairness?
Equalize usage time among clients
96
What is a Wi‑Fi Alliance?
Industry group that certifies Wi‑Fi interoperability
97
What does WPA3‑Enterprise introduce over WPA2‑Enterprise?
192‑bit encryption suite
98
What is a client isolation feature?
Prevents clients on same AP from talking directly
99
What is network slicing in Wi‑Fi?
Logical segmentation of WLAN resources