Wireless Networks Flashcards
OBJ 2.3: Compare and contrast protocols for wireless networking (45 cards)
What does Direct-Sequence Spread Spectrum (DSSS) do?
Modulates data over an entire range of frequencies using a series of signals known as chips.
What is the function of Frequency-Hopping Spread Spectrum (FHSS)?
Allows devices to hop between predetermined frequencies.
Define Orthogonal Frequency Division Multiplexing (OFDM).
Uses a slow modulation rate with simultaneous transmissions over 52 different data streams.
What is a channel in wireless networking?
A virtual medium through which wireless networks can send and receive data.
How many channels can be used in the 2.4 GHz spectrum?
11 or 14 channels.
Which channels in the 2.4 GHz band avoid overlapping frequencies?
Channels 1, 6, and 11.
What is the frequency range for the 5 GHz band?
5.725-5.875 GHz.
How many non-overlapping channels are there in the 5 GHz band?
24 non-overlapping channels.
What is channel bonding?
Allows for the creation of a wider channel by merging neighboring channels into one.
What is the standard channel size for both 2.4 GHz and 5 GHz networks?
20 MHz.
What does Multiple-Input and Multiple-Output (MIMO) utilize?
Uses multiple antennas to send and receive data.
What is Multiple User Multiple Input Multiple Output (MU-MIMO)?
Allows multiple users to access the wireless network and access point at the same time.
What causes Radio Frequency Interference (RFI)?
Occurs when there are similar frequencies to wireless networks in the area.
True or False: As signal strength decreases, the signal-to-noise ratio improves.
False.
What is a Pre-Shared Key in wireless security?
Both the access point and the client use the same encryption key.
Is Wired Equivalent Privacy (WEP) considered secure?
No, it is an insecure security protocol.
What Initialization Vector (IV) size does WEP use?
24-bit Initialization Vector (IV).
What protocol replaced WEP and follows the Temporal Key Integrity Protocol (TKIP)?
Wi-Fi Protected Access (WPA).
What does WPA use instead of WEP’s 24-bit IV?
48-bit Initialization Vector (IV).
What encryption method does WPA use?
Rivest Cipher 4 (RC4).
What is the purpose of the Message Integrity Check (MIC)?
To confirm data was not modified in transit.
What is Enterprise Mode in WPA?
To authenticate users before exchanging keys.
What wireless protocol was created as part of IEEE 802.11i standard and requires stronger encryption and integrity checking through CCMP?
Wi-Fi Protected Access 2 (WPA2)
What encryption standard does Wi-Fi Protected Access 2 (WPA2) require?
Advanced Encryption Standard (AES).