Section 7: Wireless Networks Flashcards

(44 cards)

1
Q

What is an ad hoc wireless network, and what is its other common name?

A

A decentralized, peer-to-peer (P2P) network where devices connect directly to each other. It is also known as an Independent Basic Service Set (IBSS).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what scenario would you typically use an ad hoc network instead of an infrastructure network?

A

When you need to create a quick, temporary network to share files directly between devices and no other Wi-Fi network is available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Do ad hoc networks typically provide internet access? Why or why not?

A

No, because they are typically isolated from other networks and do not connect to a wired infrastructure that provides an internet connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between an SSID and a BSSID?

A

An SSID (Service Set Identifier) is the human-readable name of the wireless network. A BSSID (Basic Service Set Identifier) is the machine-readable MAC address of the access point.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the term for the human-readable name of a wireless network?

A

SSID (Service Set Identifier).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the term for the MAC address of a wireless access point?

A

BSSID (Basic Service Set Identifier).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is an Extended Service Set (ESS) and why is it used?

A

An ESS is a configuration where multiple access points share the same SSID (which is then called an ESSID) to provide seamless wireless coverage and roaming over a large area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In an infrastructure network, what device bridges wireless clients to the wired LAN?

A

The wireless access point (AP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the primary purpose of a point-to-point (PtP) wireless network?

A

To link two distinct, fixed locations over a long distance, creating a dedicated wireless bridge where cabling is not feasible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What type of antenna is essential for creating a point-to-point wireless link?

A

A unidirectional (directional) antenna, such as a Yagi or Parabolic antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Why is a point-to-point network considered ‘static’ in nature?

A

Because it connects two fixed locations; the endpoints of the network do not move.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two key characteristics of a wireless mesh network?

A

They are self-forming and self-healing, featuring multiple redundant paths for data traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a mesh network’s ‘self-healing’ capability work?

A

It can automatically reconfigure and reroute data around broken or blocked paths using its multiple redundant connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Describe a scenario where a mesh network that integrates multiple wireless technologies would be the ideal solution.

A

In disaster relief operations where traditional infrastructure is destroyed, a mesh network can combine satellite, cellular, and Wi-Fi to create a robust, rapidly deployable communication system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the main difference in the signal pattern between an omnidirectional and a unidirectional antenna?

A

An omnidirectional antenna transmits and receives signals equally in all directions (a 360-degree pattern), while a unidirectional antenna focuses the signal in a single, concentrated direction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What type of antenna broadcasts its signal in a 360-degree pattern?

A

An omnidirectional antenna.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

When would you choose a Yagi antenna over a standard omnidirectional antenna?

A

When you need to establish a very long-distance, point-to-point communication link, such as connecting to a distant ISP tower.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What type of antenna is typically embedded in your smartphone or laptop for Wi-Fi?

A

An omnidirectional antenna.

19
Q

For what purpose are parabolic antennas most commonly used?

A

For long-distance microwave links and satellite TV reception.

20
Q

What are the three non-overlapping channels in the 2.4 GHz Wi-Fi band?

A

Channels 1, 6, and 11.

21
Q

What is channel bonding and in which frequency band is it most commonly used?

A

It is the process of merging adjacent channels into a single wider channel for higher throughput. It is commonly used in the 5 GHz and 6 GHz bands.

22
Q

What is the main advantage of the 2.4 GHz band over the 5 GHz band, and vice-versa?

A

The 2.4 GHz band offers longer range and better penetration through objects. The 5 GHz band offers faster speeds and is less congested.

23
Q

What two features did the 802.11h standard introduce to reduce interference in the 5 GHz band?

A

Dynamic Frequency Selection (DFS) and Transmit Power Control (TPC).

24
Q

What is band steering?

A

A feature on dual-band access points that encourages capable client devices to connect to the less-congested 5 GHz or 6 GHz band.

25
Which 802.11 standard was the first to introduce MIMO?
802.11n (Wi-Fi 4).
26
What technology is primarily associated with 802.11n for improving throughput?
MIMO (Multiple-Input Multiple-Output).
27
According to the official standard, what frequency band does 802.11ac operate on?
Exclusively on the 5 GHz band.
28
What technology introduced with 802.11ac allows an access point to communicate with multiple clients at the same time?
MU-MIMO (Multi-User Multiple-Input Multiple-Output).
29
What technology is primarily associated with 802.11ac and 802.11ax for multi-client communication?
MU-MIMO.
30
What is the key difference between Wi-Fi 6 and Wi-Fi 6E?
Wi-Fi 6E (an extension of the 802.11ax standard) adds support for the 6 GHz frequency band.
31
Which two 802.11 standards are officially considered dual-band?
802.11n and 802.11ax.
32
What is the critical vulnerability in WEP that makes it insecure?
Its use of a small, 24-bit Initialization Vector (IV) that is transmitted in plaintext, allowing attackers to easily crack the encryption key.
33
What wireless security protocol is vulnerable due to a small, plaintext Initialization Vector (IV)?
WEP (Wired Equivalent Privacy).
34
What protocol and algorithm did WPA use as an interim replacement for WEP?
WPA used TKIP (Temporal Key Integrity Protocol) and the RC4 stream cipher.
35
What wireless security protocol uses TKIP and RC4?
WPA (Wi-Fi Protected Access).
36
What encryption protocol and algorithm does WPA2 use to provide strong security?
WPA2 uses CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol), which is based on the strong AES (Advanced Encryption Standard) algorithm.
37
What wireless security protocol uses CCMP and AES?
WPA2 (Wi-Fi Protected Access 2).
38
How does WPA3's SAE mechanism improve upon the PSK method used in WPA2?
SAE (Simultaneous Authentication of Equals) provides a more secure initial key exchange that is resistant to offline dictionary attacks and provides forward secrecy.
39
What wireless security protocol introduced SAE to protect against offline dictionary attacks?
WPA3 (Wi-Fi Protected Access 3).
40
What is the difference between Personal mode and Enterprise mode in WPA2/WPA3?
Personal mode uses a single pre-shared key (PSK) for all users. Enterprise mode uses 802.1X for individual authentication against a central RADIUS server.
41
What is WPS and why is it considered a security risk?
WPS (Wi-Fi Protected Setup) is a standard to simplify device connection. Its PIN authentication method is flawed because it validates the PIN in two halves, making it vulnerable to rapid brute-force attacks.
42
What is the recommended security best practice regarding WPS?
It should be disabled on all wireless access points.
43
What is a captive portal and where is it commonly used?
A web page that intercepts new users on a public or guest network before granting full access. It is commonly used in hotels, airports, and coffee shops.
44
What are the three primary functions a captive portal can provide?
1. User authentication (e.g., login/password). 2. Forcing acceptance of a terms of service agreement. 3. Handling payment or collecting user data (like an email address).