SOHO Routers Flashcards
(50 cards)
(SOHO routers) SOHO routers, which stands for _____ ______ ____ ______ ______.
Small, Office, Home, Office, router
(SOHO routers) These are your common inexpensive routers that are used in _____ and small __________.
homes, businesses
(SOHO routers) These are fairly easy to set up, but if you don’t configure the router correctly, you will not have access to the _______.
network
(SOHO routers) - To set up and configure your SOHO router, you need to go into the router’s built-in _____________ web page.
- Just open up a web browser and in the address field, type in the _______ IP address.
- For example, our router has an IP address of 192.168.2.1. Once you type that in, press enter on your keyboard, and now you’re in.
configuration, router’s
(WEP) _____ __________ _______ (WEP) is one of the security protocols used for wireless networks.
Wired, Equivalent, Privacy
(WEP) As its name implies, it’s meant to supply the same security to ________ networks as it did for _____ networks.
wireless, wired
(WEP) After time, it was found out that the 40-bit encryption key that WEP used was not ______ and it was easily ________.
secure, hackable
(WPA) WPA (____ _________ ______) is another wireless security protocol that was developed to solve the security problems of WEP.
WIFI, Protected, Access
(WPA) WPA is far better than WEP in two ways.
- First, it uses a stronger encryption method using TKIP (________ ___ _________ ________), which dynamically changes keys as it’s being used.
- This ensures data integrity. And secondly, WPA uses EAP (__________ ______________ ________), which verifies authorized network users.
Temporal, Key, Integrity, Protocol, Extensible, Authentication, Protocol
(WPA2) Building on the security of WPA, WPA2 was developed to provide even stronger ________ than WPA. And it does this by requiring the use of a stronger wireless __________ method.
security, encryption
(WPA2) While WPA uses TKIP for encryption, which has known to have some limitations, WPA2 uses CCMP (_______ ____ with ______ _____ ________ _______ ______________ ____ ________) for encryption.
Counter, Mode, Cipher, Block, Chaining, Message, Authentication, Code, Protocol
(WPA2) CCMP is more secure because it uses an enhanced ____ c____________ e____________ m________.
data, cryptographic, encapsulation, mechanism
(WPA2) since 2006, WPA2 is available on all certified __-__ ________.
WIFI, Hardware
(WPS) WPS stands for __-__ _________ _____, and this security protocol was designed for users who know little about wireless networks to make it as ____ as possible for them to join a secure wireless network.
WIFI, Protected, Setup, easy
(WPS) here’s an example of a WPS configuration page for our router. And as you can see, there are three different ___ _______ that you can use to join this wireless network. (PT.1)
WPS, methods
(WPS) You could use method one if your client has a __-__ _________ _____ button.
You would just press that button, then within two minutes, you would press the WPS button here on this page. Or you can just press the ________ WPS button on the router itself, and then you’ll be connected. (PT.2)
WIFI, Protected, Setup, physical
(WPS) You can also use method two if your client has a ___ PIN number.
You would just enter that number in here and press register. (PT.3)
WPS
(WPS) you can use method three if your client asks for the router’s ___ number, and you would just enter this number into your device, and then you’ll be connected. (PT.4)
PIN
(WPS) WPS is the easiest way to join a ________ _______, and a lot of manufacturers are building their wireless products with WPS to make it as simple as possible for their customers to join their ______ to a wireless network.
wireless, network, device
(MAC Filter) Another wireless security feature is the ___ ______.
MAC, filter
(MAC Filter) Every ________ adapter has a MAC address.
wireless
(MAC Filter) A MAC address is a ___________ number that uniquely identifies each ______ on a network.
hexadecimal, device
(MAC Filter) With a MAC filter, you can either prevent or ______ access by using the device’s ___ _______.
In this example, once we enable the MAC filter, we can choose the option to prevent devices that are listed below from accessing the wireless network.
permit, MAC, Address
(MAC Filter) So, all of these devices listed here are now blocked from joining the _______.
Alternatively, we can choose the permit option, and this will allow only the devices listed below access to the network.
network