wireless Flashcards

(107 cards)

1
Q

Wireless LANs are defined in IEEE […].

A

802.11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless networks operate in […]-duplex.

A

half

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

[…] happens when a wireless signal passes through a material and is converted into heat, weakening the original signal.

A

Absorption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

[…] happens when a signal bounces off of a material, for example metal.

A

Reflection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

[…] happens when a wave encounters an obstacle and travels around it.

A

Diffraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Wireless networks use […] to avoid collisions.

A

CSMA/CA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

[…] happens when a wave is bent when entering a medium where the signal travels at a different speed.

A

Refraction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which two main bands are used for wireless LAN communications?

A

2.4 GHz
5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

[…] happens when a material causes a signal to scatter in all directions.

A

Scattering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Wi-Fi […] band consists of non-overlapping channels.

A

5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Wi-Fi […] band typically provides further reach.

A

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The Wi-Fi […] band consists of overlapping channels.

A

2.4 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does SSID stand for?

A

Service Set Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

To avoid overlapping frequencies, it is recommended to use channels […], […], and […] of the 2.4 GHz band.

A

1, 6, and 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The […] is a human-readable name which identifies the service set.

A

SSID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

802.11 defines three types of service sets:

A

Independent
Infrastructure
Mesh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An IBSS is also called an […] wireless network.

A

ad hoc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Does an SSID have to be unique?

A

No

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does BSSID stand for?

A

Basic Service Set Identifier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What does IBSS stand for?

A

Independent Basic Service Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does AP stand for?

A

Access Point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does BSA stand for?

A

Basic Service Area

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does BSS stand for?

A

Basic Service Set

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Wireless devices that have associated with a BSS are called clients or […].

A

stations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
The [...] is the MAC address of the AP's radio.
BSSID
4
The area around an AP where its signal is usable is called a [...].
BSA (Basic Service Area)
4
In a BSS, can clients communicate directly with each other?
No, they must communicate via the AP
4
What does ESS stand for?
Extended Service Set
5
What does MBSS stand for?
Mesh Basic Service Set
5
When a client passes between APs in an ESS, it is called [...].
roaming
5
In an MBSS, what does RAP stand for?
Root Access Point
5
In an MBSS, which AP is connected to the wired network?
RAP (Root Access Point)
5
In an MBSS, what does MAP stand for?
Mesh Access Point
5
Which two messages are used for 802.11 active scanning?
Probe request Probe response
5
In 802.11, the upstream wired network is called the [...].
DS (Distribution System)
5
There are three 802.11 connection states: 1: [...] 2: [...] 3: [...]
1: Not Authenticated, not Associated. 2: Authenticated, not Associated. 3: Authenticated and Associated.
5
What are the three 802.11 message types?
Management Control Data
5
Which messages does a wireless station listen for when doing 802.11 passive scanning?
Beacon
5
What 802.11 message type? Authentication
Management
5
What 802.11 message type? Probe response
Management
5
What 802.11 message type? Beacon
Management
5
What 802.11 message type? Probe request
Management
5
What 802.11 message type? RTS
Control
6
What 802.11 message type? CTS
Control
6
[...] APs are self-contained systems that don't rely on a WLC.
Autonomous
6
What 802.11 message type? ACK
Control
6
The use of lightweight APs and WLCs is also known as [...] architecture.
split-MAC
6
What are the three main wireless AP deployment methods? (three architectures)
Autonomous Lightweight Cloud-based
6
Autonomous APs connect to a switch via [access/trunk] ports.
trunk
6
CAPWAP [...] tunnels use UDP port 5246.
Control
6
What does WLC stand for?
Wireless LAN Controller
6
CAPWAP Control tunnels use UDP port [...].
5246
6
CAPWAP [...] tunnels use UDP port 5247.
Data
6
CAPWAP Data tunnels use UDP port [...].
5247
6
How many CAPWAP tunnels does a lightweight AP form with the WLC?
2 (control and data)
6
The CAPWAP [...] tunnel is encrypted by default.
control
6
The CAPWAP control tunnel [is/isn't] encrypted by default.
is
6
The CAPWAP [...] tunnel isn't encrypted by default.
data
6
The CAPWAP data tunnel [is/isn't] encrypted by default.
isn't
6
Which feature allows a lightweight AP to locally switch traffic if the tunnels to the WLC go down?
FlexConnect
6
Lightweight APs connect to a switch via [access/trunk] ports.
access
6
Which lightweight AP operating mode is dedicated to RF spectrum analysis on all channels?
SE-Connect
6
A [...] WLC is a hardware appliance in a central location of the network.
Unified
6
Which messages does a wireless station listen for when doing 802.11 passive scanning?
Beacon
6
[...] AP architecure is between autonomous AP and split-MAC architecture in terms of functionality.
Cloud-based
6
A [...] WLC is a VM running on a server, usually in a private cloud in a data center.
Cloud-based
6
A [...] WLC is integrated within an AP.
Mobility Express
6
A Mobility Express WLC can support about [...] APs.
100
6
A Unified WLC can support about [...] APs.
6000
6
A Cloud-based WLC can support about [...] APs.
3000
6
An Embedded WLC can support about [...] APs.
200
6
Cisco [...] is a popular cloud-based AP solution.
Meraki
6
Which lightweight AP operating mode is dedicated to receiving 802.11 frames to detect rogue devices?
Monitor
6
Which feature allows a lightweight AP to locally switch traffic if the tunnels to the WLC go down?
FlexConnect
7
An [...] WLC is integrated within a switch.
Embedded
7
What is the default operating mode of a lightweight AP, in which it offers a BSS for clients?
Local
7
Which lightweight AP operating mode is dedicated to listening to traffic on the wired network to detect rogue devices? (it does not use its radio)
Rogue Detector
7
What does MIC stand for?
Message Integrity Check
7
A [...] is used by a wireless AP to encrypt traffic that it wants to send to all of its clients.
group key
7
Which lightweight AP operating mode is dedicated to capturing 802.11 frames and sending them to a device running software such as Wireshark?
Sniffer
7
WEP uses the [...] algorithm for encryption.
RC4
7
WEP keys can be [...] or [...] in length.
40 bits (+24 = 64) or 104 bits (+24 = 128)
7
What does LEAP stand for?
Lightweight EAP
7
When using [...] authentication, all authentication requests are accepted.
open
7
What does PEAP stand for?
Protected EAP
7
Which 802.1X entity? The device that provides access to the network.
Authenticator
7
EAP is integrated with [...], which provides port-based network access control.
802.1X
7
Which 802.1X entity? The device that wants to connect to the network.
Supplicant
7
Which 802.1X entity? The device that receives client credentials and permits/denies access.
Authentication Server (AS)
7
LEAP provides mutual authentication by exchanging [...]
challenge phrases
7
LEAP uses [...] WEP keys that change frequently.
dynamic
7
Three phases of EAP-FAST: 1: PAC is passed from server to client 2: [...] 3: Client is authenticated via the TLS tunnel
Secure TLS tunnel is established
7
In EAP-FAST, a [...] is passed from the server to the client.
PAC (Protected Access Credential)
7
Three phases of EAP-FAST: 1: [...] 2: Secure TLS tunnel is established 3: Client is authenticated via the TLS tunnel
PAC is passed from server to client
7
Three phases of EAP-FAST: 1: PAC is passed from server to client 2: Secure TLS tunnel is established 3: [...]
Client is authenticated via the TLS tunnel
7
In PEAP, the server is authenticated via a [...].
certificate
7
In PEAP, which device/devices require a certificate?
AS only
7
In EAP-TLS, which device/devices require a certificate?
AS and supplicant
7
What does CCMP use for encryption?
AES counter mode
7
What does GCMP use for encryption?
AES counter mode
7
Which encryption protocol was developed as an improvement upon WEP?
TKIP
7
Which WPA authentication mode uses a PSK?
Personal mode
7
What are the two WPA authentication modes?
Personal, Enterprise
7
Which WPA authentication mode uses 802.1X/EAP?
Enterprise mode
7
WPA uses [...] for encryption/MIC.
TKIP
7
WPA2 uses [...] for encryption/MIC.
CCMP
7
WPA3 uses [...] for encryption/MIC.
GCMP