Module 06 Flashcards

1
Q

A continuum of electromagnetic waves used for data and voice communication.

A

Wireless spectrum

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A specific frequency range on the wireless spectrum.

A

Bands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Any device connected to the Internet.

A

IoT (Internet of Things)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A wireless technology that uses electromagnetic fields to store data on a small chip in a tag, which includes an antenna that can both transmit and receive, and possibly a battery.

A

RFID (Radio Frequency Identification)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A form of radio communication that transfers data wirelessly over very short distances (usually 10 cm or less).

A

NFC (near-field communication)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A smart home protocol that provides two basic types of functions: signaling, to manage wireless connections, and control, to transmit data and commands between devices.

A

Z-wave

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A smart home protocol based on the 802.15.4 standard that requires little power and is designed to handle small amounts of data, which makes it ideal for ISM (industrial, scientific, and medical) sensors.

A

ZigBee

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A low-power wireless technology that provides close-range communication between devices such as PCs, smartphones, tablets, and accessories.

A

Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

An open source wireless technology that gathers and tracks information from sensors typically embedded in heart rate monitors, GPS devices, and other activity monitoring devices.

A

ANT+

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A wireless technology that uses a bandwidth just below the spectrum that is visible to the human eye, with longer wavelengths than red light.

A

IR (infrared)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A wireless signal or path that travels directly in a straight line from its transmitter to its intended receiver.

A

LOS (line of sight)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A wireless signaling technique in which a signal jumps between several frequencies within a band in a synchronization pattern known to the channel’s receiver and transmitter.

A

FHSS (frequency hopping spread spectrum)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A modulation technique that, like other spread-spectrum technologies, distributes lower-level signals over several frequencies simultaneously.

A

DSSS (direct sequence spread spectrum)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A device used on wireless LANs that accepts wireless signals from multiple nodes and retransmits them to the rest of the network.

A

AP (access point)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The relative strength over a three-dimensional area of all the electromagnetic energy an antenna sends or receives.

A

Radiation pattern

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A type of antenna that issues wireless signals along a single direction, or path. Also called a unidirectional antenna.

A

Directional antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A type of antenna that issues and receives wireless signals with equal strength and clarity in all directions.

A

Omnidirectional antenna

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The geographical area in which signals issued from an antenna or wireless system can be consistently and accurately received.

A

Range

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The calculation of net gain or loss of a signal’s strength, taking into consideration the transmission power (dBm), cable loss (dB), and antenna gain (dBi).

A

EIRP (effective isotropic radiated power)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The measure in dBm (decibels relative to one milliwatt) of the power of a transmitted signal at the point of the receiver.

A

RSSI (received signal strength indicator)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The way in which a wave travels from one point to another.

A

Propagation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A device that extends the reach of a wireless signal by repeating the signal from a closer broadcast point.

A

Wireless range extender

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A variation in a wireless signal’s strength as a result of some of the electromagnetic energy being scattered, reflected, or diffracted after being issued by the transmitter.

A

Fading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Degradation of a wireless signal caused by electromagnetic waves in the atmosphere.

A

Interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The proportion of noise to the strength of a signal.

A

SNR (signal-to-noise ratio)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

In the context of wireless signaling, the way in which a wave alters its direction, speed, and wavelength when it travels through different transmission mediums.

A

Refraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

In the context of wireless signaling, the phenomenon that occurs when an electromagnetic wave encounters an obstacle and bounces back toward its source.

A

Reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The distance from the crest of one wave to the crest of the next wave.

A

Wavelength

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The diffusion, or the reflection in multiple directions, of a wireless signal that results from hitting an object with a rough surface or small dimensions compared to the signal’s wavelength.

A

Scattering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

In the context of wireless signal propagation, the phenomenon that occurs when an electromagnetic wave encounters an obstruction and splits into secondary waves.

A

Diffraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The IEEE standards and their amendments, extensions, and corrections for wireless networking.

A

Wi-Fi (wireless fidelity)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

The IEEE standard for a wireless networking technique that uses DSSS (direct-sequence spread spectrum) signaling in the 2.4-GHz frequency range and provides a theoretical maximum throughput of 11 Mbps.

A

802.11b

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The IEEE standard for a wireless networking technique that uses multiple frequency bands in the 5-GHz frequency range and provides a theoretical maximum throughput of 54 Mbps.

A

802.11a

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The IEEE standard for a wireless networking technique designed to be compatible with 802.11b in the 2.4-GHz frequency range while using different data modulation techniques that allow it to reach a theoretical maximum capacity of 54 Mbps.

A

802.11g

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The IEEE standard for a wireless networking technique that may issue signals in the 2.4-GHz or 5-GHz band and can achieve actual data throughput between 65 Mbps and 600 Mbps. Also called Wi-Fi 4.

A

802.11n

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The IEEE standard for a wireless networking technique that may issue signals in the 2.4-GHz or 5-GHz band and can achieve actual data throughput between 65 Mbps and 600 Mbps. Also called 802.11n.

A

Wi-Fi 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

The IEEE standard for a wireless networking technique that exceeds benchmarks set by earlier standards by increasing its useful bandwidth and amplitude. 802.11ac is the first Wi-Fi standard to approach Gigabit Ethernet capabilities. Also called Wi-Fi 5.

A

802.11ac

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The IEEE standard for a wireless networking technique that exceeds benchmarks set by earlier standards by increasing its useful bandwidth and amplitude. Wi-Fi 5 is the first Wi-Fi standard to approach Gigabit Ethernet capabilities. Also called 802.11ac.

A

Wi-Fi 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

The IEEE standard for a wireless networking technique that operates in both the 2.4-GHz and 5-GHz bands and improves on earlier standards through the implementation of modulation and multi-user technologies. Also called Wi-Fi 6.

A

802.11ax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

The IEEE standard for a wireless networking technique that operates in both the 2.4-GHz and 5-GHz bands and improves on earlier standards through the implementation of modulation and multi-user technologies. Also called 802.11ax.

A

Wi-Fi 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

An enhancement to the IEEE standard 802.11ax that uses the 6-GHz frequency range.

A

Wi-Fi 6E

42
Q

In the context of 802.11 wireless technology, the combination of two or more adjacent 20-MHz frequency bands to create one 40-, 60-, 80-, or 120-MHz channel.

A

Channel bonding

43
Q

In the context of 802.11 wireless networking, the ability for access points to use multiple antennas to issue multiple signals to stations, thereby multiplying the signal’s strength and increasing their range and data-carrying capacity.

A

MIMO (multiple input-multiple output)

44
Q

In the context of 802.11 wireless networking, the ability for access points to use multiple antennas to issue multiple signals to different stations at the same time, thereby reducing congestion and contributing to faster data transmission.

A

MU-MIMO (multiuser MIMO)

45
Q

In the context of 802.11 wireless technology, a technique that supports more efficient multi-user functionality by allowing an AP to subdivide each channel into smaller frequency allocations for each client, such as 2 MHz or 4 MHz of each 20 MHz channel.

A

OFDMA (Orthogonal Frequency Division Multiple Access)

46
Q

A network access method used on 802.11 wireless networks. CSMA/CA does not eliminate, but minimizes, the potential for collisions.

A

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

47
Q

An exchange in which a source node requests the exclusive right to communicate with an access point and the access point confirms that it has granted that request.

A

RTS/CTS (Request to Send/Clear to Send)

48
Q

In the context of wireless networking, the communication that occurs between a wireless client and an access point enabling the client to connect to the network via that access point.

A

Association

49
Q

The process by which a wireless station finds an access point.

A

Scanning

50
Q

A character string used to identify an access point on an 802.11 network.

A

SSID (service set identifier)

51
Q

A small number of nodes closely positioned to transmit directly to each other without an intervening connectivity device.

A

IBSS (independent basic service set)

52
Q

A type of wireless LAN in which stations communicate directly with each other (rather than using an access point).

A

Ad hoc topology

53
Q

In IEEE terminology, a group of stations that share an access point.

A

BSS (basic service set)

54
Q

A type of wireless network in which stations communicate through an access point and not directly with each other.

A

Infrastructure topology

55
Q

In IEEE terminology, the identifier for a BSS (basic service set).

A

BSSID (basic service set identifier)

56
Q

A group of access points and associated stations (or basic service sets) connected to the same LAN.

A

ESS (extended service set)

57
Q

(1) A type of network in which several nodes are directly interconnected and no single node controls communications on the network. (2) A wireless network in which multiple APs work as peer devices on the same network, thereby providing more fault-tolerant network access to clients.

A

Mesh topology

58
Q

A central management console for all the APs on a network.

A

Wireless LAN controller

59
Q

A special identifier shared by BSSs that belong to the same ESS.

A

ESSID (extended service set identifier)

60
Q

An unauthorized access point in the same vicinity as a legitimate network.

A

Rogue access points

61
Q

The movement of a wireless client from one network or access point to another.

A

Roam

62
Q

In the context of wireless networking, the process by which a station establishes a connection with (or associates with) a different access point.

A

Reassociation

63
Q

A voice controlled IoT device that provides an embedded personal assistant app used to access information and control other IoT devices.

A

Smart speakers

64
Q

More sophisticated than a programmable thermostat, an Internet-connected thermostat device that can be controlled remotely through an app or can monitor environmental or behavioral information to automatically adjust temperature settings.

A

Smart thermostat

65
Q

An Internet-connected doorbell with two-way audio and one- or two-way video capability that monitors an entryway and provides alerts when movement is detected.

A

Smart doorbell

66
Q

A network or Internet connected video camera that sends alerts or video footage to a smartphone app where the user can remotely monitor covered areas.

A

Security camera

67
Q

An Internet-connected refrigerator that uses RFID or barcode tracking to detect items in the refrigerator.

A

Smart refrigerator

68
Q

In the context of wireless networking, an assessment of client requirements, facility characteristics, and coverage areas to determine an access point arrangement that will ensure reliable wireless connectivity within a given area.

A

Site survey

69
Q

An access point used to create remote wired access to a network.

A

Wireless bridge

70
Q

A process of configuring clients for wireless access to a network.

A

Onboarding

71
Q

The reverse process of onboarding, involving the removal of programs that gave a device special permissions on the network.

A

Offboarding

72
Q

A security procedure that clears a device of all important information, permissions, and applications without having physical access to the device.

A

Remote wipe

73
Q

The practice of allowing people to bring their personally owned smartphones, laptops, or other technology into a facility for the purpose of performing work or school responsibilities.

A

BYOD (bring your own device)

74
Q

A security measure that prevents an AP or a switch from authenticating any device whose MAC address is not listed by the network administrator as an approved device.

A

MAC filtering

75
Q

A key encryption technique for wireless networks that uses keys both to authenticate network clients and to encrypt data in transit.

A

WEP (Wired Equivalent Privacy)

76
Q

A wireless security method that dynamically assigns every transmission its own key.

A

WPA (Wi-Fi Protected Access)

77
Q

An encryption key generation and management scheme used by WPA (Wi-Fi Protected Access).

A

TKIP (Temporal Key Integrity Protocol)

78
Q

An insecure encryption cipher that is still widely used.

A

RC4 (Rivest Cipher 4)

79
Q

A wireless security method that improves upon WPA by using a stronger encryption protocol called AES (Advanced Encryption Standard).

A

WPA2

80
Q

A security method used in WPA2 that helps ensure data confidentiality by providing message integrity and encryption services.

A

CCMP

81
Q

A security method used in WPA2 that helps ensure data confidentiality by providing message integrity and encryption services.

A

Counter Mode with CBC (Cipher Block Chaining) MAC (Message Authentication Code) Protocol

82
Q

A private key encryption algorithm that uses a sophisticated family of ciphers along with multiple stages of data transformation.

A

AES (Advanced Encryption Standard)

83
Q

An authentication method for WPA or WPA2 that requires a passphrase for a device to be authenticated to the network.

A

PSK

84
Q

An authentication method for WPA or WPA2 that requires a passphrase for a device to be authenticated to the network.

A

Pre-Shared Key

85
Q

A popular protocol for providing centralized AAA services for multiple users.

A

RADIUS (Remote Authentication Dial-In User Service)

86
Q

An authentication mechanism that provides the framework for authenticating clients and servers. It does not perform encryption or authentication on its own, but rather works with other encryption and authentication schemes to verify the credentials of clients and servers.

A

EAP (Extensible Authentication Protocol)

87
Q

A vendor-independent IEEE standard for securing transmission between nodes according to the transmission’s port, whether physical or logical. 802.1X, also known as EAPoL, is commonly used with RADIUS authentication.

A

802.1X

88
Q

A vendor-independent IEEE standard, numbered 802.1X, for securing transmission between nodes according to the transmission’s port, whether physical or logical, and commonly used with RADIUS authentication.

A

EAPoL (EAP over LAN)

89
Q

An authentication restriction that determines a client’s geographic location to enforce a virtual security perimeter.

A

Geofencing

90
Q

A separate wireless network created through a Wi-Fi router or access point to protect a private network while still providing guests with access to the Internet.

A

Guest network

91
Q

A security technique for wireless networks that allows a wireless client onto the network but imposes firewall rules to restrict the client’s ability to communicate with only the default gateway, not other devices on the network.

A

Wireless client isolation

92
Q

The first page displayed by a client’s browser when the client connects to a guest network. This page usually requires the user to agree to a set of terms and conditions before gaining further access to the guest network.

A

Captive portal

93
Q

An exploit in which a rogue access point masquerades as a legitimate access point, using the same SSID and potentially other identical settings.

A

Evil twin

94
Q

An attempt to discover an encryption key or password by trying numerous possible character combinations until the correct combination is found.

A

Brute force attack

95
Q

A software tool that assesses the characteristics (for example, frequency, amplitude, and the effects of interference) of wireless signals.

A

Spectrum analyzer

96
Q

Software that can evaluate Wi-Fi network availability as well as help optimize Wi-Fi signal settings or help identify Wi-Fi security threats.

A

Wi-Fi analyzer

97
Q

A characteristic of a wireless device’s antenna that determines what axis the antenna’s signals will follow, such as a vertical axis or horizontal axis.

A

Polarization

98
Q

A specific frequency range on the wireless spectrum.

A

Band

99
Q

A security method used in WPA2 that helps ensure data confidentiality by providing message integrity and encryption services.

A

CCMP (Counter Mode with CBC [Cipher Block Chaining] MAC [Message Authentication Code] Protocol)

100
Q

A small number of nodes closely positioned to transmit directly to each other without an intervening connectivity device.

A

IBSS (independent basic server set)