A(n) ____ is a transceiver that connects to a network via an Ethernet cable; it bridges the wireless LAN with the wired network.
access point (AP)
A(n) ______________________________ is the name used to identify the wireless local area network (WLAN), much the same way a workgroup is used on a Windows network.
service set identifier
service set identifier (SSID)
SSID (service set identifier)
CSMA/CD is used at the data link layer on wireless networks.
Each frequency band contains ____; if they overlap, interference could occur.
In 802.1X, what is an authentication server?
This server, which might be a Remote Access Dial-In User Service (RADIUS) server, is used as a centralized component that authenticates the user and performs accounting functions. For example, an ISP using RADIUS can verify who logged on to the ISP service and how long the user was connected. Most RADIUS servers are *nix based, but the Microsoft implementation of RADIUS is called Internet Authentication Service (IAS).
In 802.1X, a(n) ____ is the wireless user attempting access to a WLAN.
In 802.11, an addressable unit is called a ____.
In a WPAN, the maximum distance allowed between each device is usually ____ meters.
In the 802.11 standard, a mobile station is defined as a station that accesses the LAN while moving; a(n) ____________________ station is one that can move from location to location, but is used only while in a
It’s possible to have a wireless network that doesn’t connect to a wired network
this technology is restricted to a single room or line of sight
uses microwave radio band frequencies to transmit data
data is spread across a large-frequency bandwidth instead of traveling across just one frequency band
addresses the issue of wireless metropolitan area networks (MANs)
addresses wireless MANs for mobile users who are sitting in trains, subways, or cars
European WLAN standard
uses GFSK modulation
uses DSSS modulation
defines the process of authenticating and authorizing users on a network
One of the default SSIDs used by D-Link is ____.
The 802.11 standard applies to the Physical layer of the OSI model, which deals with wireless connectivity issues of fixed, portable, and moving stations in a local area, and the Media Access Control (MAC) sublayer of the ____.
Data Link layer
The 802.11b standard introduced Wired Equivalent Privacy (WEP), which gave many users a false sense of security that data traversing the WLAN was protected.
The ____ band is used by commercial AM radio stations.
medium frequency (MF)
The ____ standard, also referred to as Wi-Fi, operates in the 2.4 GHz range with an increased throughput from 1 or 2 Mbps to 11 Mbps.
The ____ standard has improvements to address the problem of interference.
The first wireless technology standard, ____________________, defined the specifications for wireless connectivity at 1 Mbps and 2 Mbps in a LAN.
The default SSID used by Cisco is ____
There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.
WEP stands for ___________________
Wired Equivalent Privacy
WPA improves encryption by using __
What are the basic components of a wireless network?
The basic components of a wireless network are:
- Wireless network interface card (WNIC)
- Access point (AP)
- Wireless networking protocols
- A portion of the RF spectrum
What is WEP? Is it a good way to secure wireless networks
Wired Equivalent Privacy (WEP), part of the 802.11b standard, was developed to encrypt data traversing a wireless network. For some time, it gave many security professionals a false sense of security that wireless technology could be just as safe as wired networks. Unfortunately, WEP has been torn to shreds by security professionals, professors from major universities, and hackers who post ways to crack WEP encryption. Some argue that WEP is still better than no security at all, and when it’s combined with the security of a virtual private network (VPN), they claim that WEP works well for home users or small businesses. Still, many saw a need for a better way to protect WLANs.
What is a certificate
A certificate is a record that authenticates network entities, such as a server or client. It contains X.509 information that identifies the owner, the certificate authority (CA), and the owner’s public key.
What is frequency-hopping spread spectrum (FHSS)
Data hops to other frequencies to avoid any interference that might occur over a frequency band. This hopping from one frequency to another occurs at split-second intervals and makes it difficult for an intruder or attacker to jam the communication channel.
What is the IEEE 802.15 standard?
The 802.15 standard addresses networking devices within one person’s workspace, which is called the wireless personal area network (WPAN). The maximum distance between devices is usually no more than 10 meters
What is the function of a WG of the IEEE?
Working groups (WGs) of the IEEE are formed to develop new standards. After a WG has reached consensus on a proposal for a standard, the Sponsor Executive Committee must approve the proposal. Finally, after the proposal is recommended by the Standards Review Committee and approved by the IEEE Standards Board, you have a new standard.
What is the role of a WNIC
For wireless technology to work, each node or computer must have a WNIC, which converts the radio waves it receives into digital signals the computer understands. There are many wireless NICs on the market, but be careful deciding which ones to purchase if you’re considering using specific tools for detecting APs and decrypting WEP keys, or using antennas that can cover a large distance.
____ defines how data is placed on a carrier signal
____ Project 802 was developed to create LAN and WAN standards.
___ is a freeware tool written for Windows that enables you to detect WLANs using 802.11a, 802.11b, and 802.11g
___ is an enhancement to PPP
____ is a product for conducting wardriving attacks written by Mike Kershaw. This product is free and runs on Linux, BSD, Mac OS X, and even Linux PDAs
___ is the most popular type of WLAN technology.
___ is the tool most hackers wanting to access WEP-enabled WLANs use.
___ uses TLS to authenticate the server to the client but not the client to the server.
___________________________ is specified in the 802.11i standard and corrected many security vulnerabilities in 802.11b.
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA)
WPA (Wi-Fi Protected Access)