Module 5 - Wireless network communication Flashcards

(88 cards)

1
Q

Which IEEE working group defines standards for wireless LANs (WLANs)?

A

IEEE 802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which device connects clients in a WLAN, in contrast to Ethernet switches in wired LANs?

A

A wireless Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which IEEE working group defines standards for wired Ethernet LANs?

A

IEEE 802.3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How do wireless NICs affect mobile device performance?

A

They tend to reduce battery life

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What medium access method does 802.11 use to avoid collisions in RF media?

A

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What medium access method is used in wired Ethernet LANs?

A

CSMA/CD (Carrier Sense Multiple Access with Collision Detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which aspect of WLANs introduces increased privacy concerns due to the nature of its physical transmission?

A

Radio Frequencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the three main sections found in all Layer 2 frames?

A

A header, payload and FCS (Frame check sequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which 802.11 frame field identifies frame type, power management status, protocol version, and security settings?

A

Frame control field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which part of the OSI model contains the frame format that WLANs modify by adding extra header fields compared to Ethernet?

A

Layer 2 (Data link layer)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which 802.11 frame field tells how long the medium will be busy receiving the next frame transmission?

A

Duration -{used to reserve the channel and avoid collisions by specifying transmission time.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which 802.11 frame field typically contains the MAC address of the receiving device or access point?

A

Address 1 field -{this field targets the immediate recipient in a wireless transmission.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which 802.11 frame field carries information that helps in sequencing packets and reassembling fragmented frames?

A

Sequence control field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which field in the 802.11 frame contains the actual user data for transmission across the wireless network?

A

The payload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which 802.11 frame field may contain the MAC address of the final destination, such as a router or default gateway?

A

Address 3 field -{often used to specify the network-level destination beyond the AP.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which 802.11 frame field holds the MAC address of the transmitting wireless device or access point?

A

Address 2 field -{it identifies the original sender of the wireless frame.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the name of the special wireless communication mode where devices connect directly to each other without needing a router or access point (AP)?

A

ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which field in the 802.11 frame provides error-checking at Layer 2 to ensure frame integrity?

A

The FCS (Frame check sequence)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which wireless mode involves devices connecting through an access point that is wired into a distribution system using Ethernet?

A

Infrastructure mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which type of duplexing is used in WLANs, allowing only one device to transmit or receive at a time?

A

Half duplexing -{restricts communication to one direction at a time in WLANs.}

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which wireless mode involves devices connecting through an access point that is wired into a distribution system using Ethernet?

A

ad hoc mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which setup allows a cellular device to act as both a router and internet provider to other devices through wireless sharing?

A

Tethering (hotspot mode)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which identifier corresponds to the MAC address of the access point in a Basic Service Set?

A

BSSID (Basic Service Set Identifier)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which wireless configuration connects multiple access points with unique MAC addresses to a common wired backbone, enabling roaming?

A

ESS (Extended Service Set)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
What term refers to the small wireless area covered by a single access point?
BSA (Basic Service Area)
18
Which wireless setup uses a single access point to provide coverage in a limited area without roaming capabilities?
BSS (Basic Service Set)
19
Which address field in an 802.11 frame is most likely to be used in ad hoc wireless mode?
Address 4
19
Which term describes the initial check wireless devices perform to ensure the channel is clear before transmitting?
Carrier Sense
19
Which term describes the ability to move between access points on the same ESS without losing connectivity?
Roaming
19
What signal does a wireless device send to request permission to transmit data in CSMA/CA?
RTS (Request to Send)
20
What does the access point send in response to an RTS to allow a device to transmit?
CTS (Clear to send)
21
Which term describes the process where a wireless client agrees on parameters with an access point before communication?
Association
21
What term describes access points that can support multiple wireless standards at once?
Mixed mode
22
Which wireless channel property means all clients transmit and receive using the same frequency band?
Shared media -{Configuration where all clients use the same radio channel leading to potential collision}
23
Which process does a wireless client perform first to check if it can transmit data?
Carrier sensing -{It listens to the channel to detect whether the medium is idle}
23
What happens if a client does not receive a CTS response from the AP?
The client waits for a random amount of time and restarts the process to avoid collision.
23
Which final step in the CSMA/CA process occurs after receiving CTS and sending data?
The transmission is acknowledged , confirming that the data was received.
24
Which three-stage process must a wireless device complete to communicate on a WLAN?
A wireless device point must discover an AP, authenticate with it and associate with it
25
Which initial step in the wireless association process identifies available wireless networks?
Discovering a wireless AP
26
Which step in the association process ensures the client is permitted to access the AP?
Authentication -{where the client proves its identity to the AP}
27
Which final step in the association process establishes a usable connection between client and AP?
Association -{where the AP and client agree on settings and complete the connection.}
27
Which configuration defines the specific 802.11 standard being used by a device or AP?
Network mode -{determines whether the connection uses 802.11a/b/g/n/ac/ad.}
28
Which AP behavior automatically selects a frequency band based on nearby interference?
Channel scanning -{AP evaluates the RF environment and picks the best channel.}
29
Which method allows wireless clients to discover APs by listening for regularly broadcasted beacon frames?
Passive mode -{ clients passively receive beacon frames containing SSID, standards, and security settings.}
30
Which type of wireless frame is periodically sent by an AP in passive discovery to advertise its network presence?
A Beacon Frame
31
Which discovery mode requires the client to already know the SSID before initiating a probe request?
Active Mode -{where the client must send a probe request including the known SSID}
32
Which type of frame does a client send to initiate discovery in active mode?
A probe request -{ broadcasted by the client to locate an AP using a specific SSID.}
32
Which field must be included in a probe request when a client is searching for a specific WLAN?
The SSID of the specific AP
32
Which device enables wireless clients to connect to a wired LAN and is commonly integrated with routing and switching functions in small networks?
A wireless router
32
Which centralized device manages all access point configurations, SSIDs, and authentication settings in a large wireless network?
A WLC (Wireless LAN Controller)
32
Which role do APs assume when they no longer operate independently but instead depend on a WLC for management?
LWAP (Lightweight Access Points) -{APs that only forward data and offload control functions to the WLC.}
32
Which type of attack attempts to prevent legitimate users from accessing the WLAN?
A DoS (Denial of Service) attack. -{either accidental or malicious in origin.}
32
Which threat involves an unauthorized access point being connected to the corporate network?
A rogue access point -{potentially installed by employees or attackers without approval.}
32
Which frequency band is more prone to interference from household devices and Which frequency band is preferred in environments with heavy RF interference?
2.4GHz frequency band is prone to interference and the 5GHz frequency band is preferred in environments with heavy RF interference.
32
Which configuration practice minimizes the risk of DoS from misconfiguration or sabotage? (2)
Securing them with passwords and Hardening the devices
32
Which type of wireless attack positions the hacker between two legitimate parties to intercept or alter data in transit?
A MiTM attack
32
Which setting prevents an AP from advertising its SSID in beacon frames, requiring clients to manually enter the network name?
SSID Cloaking
32
Which basic wireless security measure limits network access by specifying which MAC addresses are allowed or denied?
MAC Address filtering
33
Which wireless authentication method was designed for environments where security is not a concern?
Open System Authentication
33
Which tool should a wireless client use when connecting to an open authentication network to ensure security?
A VPN
33
Which authentication method uses a shared password and supports encryption with WEP, WPA, WPA2, or WPA3?
Shared Key authentication
34
Which original 802.11 encryption method used RC4 with a static key that never changed between packets?
WEP (Wired Equivalent Privacy)
34
Which encryption method improved upon WEP by dynamically changing encryption keys for each packet?
WPA (Wi-Fi Protected Access)
34
Which encryption protocol used by WPA dynamically changes keys with each packet to resist hacking?
A TKIP (Temporal Key Integrity Protocol)
34
Which wireless authentication standard is the current industry recommendation and uses AES encryption?
WPA2 (Wi-Fi Protected Access 2)
34
Which encryption method used by WPA2 is currently considered the strongest wireless encryption available?
AES (Advanced Encryption Standard)
35
Which standard disallows legacy protocols, requires Protected Management Frames (PMF), and is the newest Wi-Fi security method?
WPA3 (Wi-Fi Protected Access 3)
36
Which WPA2 authentication method is designed for home or small office networks and uses a shared password?
WPA2 Personal
36
In WPA2 Personal mode, how does a wireless client authenticate with the network?
Using a PSK (Pre shared key)
37
Which WPA2 authentication mode is intended for enterprise environments and requires a RADIUS server?
WPA2 Enterprise
38
Which WPA2 authentication mode uses Extensible Authentication Protocol (EAP) under the 802.1X framework for verifying users?
WPA2 Enterprising
39
What is required in a WPA2 Enterprise network in addition to client devices and an AP?
A RADIUS Authentication Server
39
Which encryption method does WPA use to improve upon WEP while maintaining legacy compatibility?
A TKIP (Temporal Key Integrity Protocol) -{adds MIC -message integrity check}
40
What is the purpose of the Message Integrity Check (MIC) in TKIP encryption?
To ensure that the contents of the encrypted packet have not been altered.
40
Which encryption protocol is used by WPA2 and provides stronger protection than TKIP?
AES (Advanced Encryption Standard)
40
Which protocol in WPA2 encryption ensures that tampering of bits in transit can be recognized by the destination host?
CCMP
41
What does AAA stand for in the context of wireless enterprise authentication?
Authentication , Authorization and Accounting
42
Which UDP port is officially assigned for RADIUS Authentication?
UDP port 1812
43
Which UDP port is officially assigned for RADIUS Accounting?
UDP port 1813
43
Which alternative UDP ports can RADIUS also operate on, aside from the officially assigned ones?
UDP Ports 1645 for Authentication and 1646 for Accounting
44
Which WPA3 mode prevents attackers from capturing a handshake and using brute force to guess the PSK via Simultaneous Authentication of Equals (SAE) to prevent PSK exposure?
WPA3 Personal
44
Which IEEE specification defines the SAE method used in WPA3-Personal?
IEEE 802.11-2016
45
Which WPA3 mode uses a 192-bit cryptographic suite and CNSA standards?
WPA3 Enterprise
45
Which U.S. government standard is referenced by WPA3-Enterprise for its security algorithms?
CNSA (Commercial National Security Algorithm) suite
46
What type of encryption is added to public Wi-Fi in WPA3 to protect unauthenticated user traffic?
OWE (Opportunistic Wireless Encryption) -{encrypts traffic even in open networks.}
46
Which onboarding protocol is designed to securely connect IoT devices to a WPA3 network without using a GUI?
DPP (Device Provisioning Protocol)
46
What typically contains the public key used for onboarding IoT devices with DPP?
A QR (Quick Response) code
47
What vulnerable protocol used in WPA2 for quick device onboarding is being replaced in WPA3 environments?
WPS (Wi-Fi Protected Setup)