Wireless Networks Flashcards

(80 cards)

1
Q

Ad Hoc

A

decentralized - peer to peer
IBSS
devices connect directly to each other rather than through a central access point

Doesn’t typically provide Internet access

Use: sharing files wirelessly to create a direct connction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Infrastructure Wireless Networks

A

more organized setup. Each wireless access point each has their own BSSID (Basic Service Set Identifier) set to the MAC address of the wireless access point

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SSID - Service set identifier

A

common alphanumeric network name that end users can search for to connect to wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Point-to-Point Wireless Network

A

connect 2 distinct locations over long distances

static nature, highly efficient

use: good to link buildings in a good location
EX: living in Puerto Rico, put an antenna pointed at tall building to get that wireless network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Wireless Mesh Network

A

each node in the network can connect with other nodes and create infinite paths for data to travel across

self-healing, reconfigure themselves, great for large-scale deployments when you can’t lay cables

EX: jason helping in diaster areas to create a huge wireless network (mesh network)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

autonomous access point

A

a standalone device that contains all of intelligence to handle wireless networking functions independently

EX: home users use one access point for internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Lightweight access points

A

multiple access points connected back to a centralized controller

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

wireless antenna

A

devices designed to send and receive radio frequency signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Omnidirectional antennas

A

designed to transmit and receive wireless signals in all directions equally

In most devices

great for covering broad areas
default type of antenna for wireless access point, wireless public networks in coffee shops, hotels, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Unidirectional Antennas

A

focuses on a single direction to provide a more concentrated signal beam

Use: reaching remote locations (to a barn house example)
when creating a point-to-point connection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Yagi Antenna

A

provide high signal gains and uses a narrow beamwidth - directional or unidirectional antenna

used in remote locations to connect to far-off cell tower

best when capturing or sending signals over long distances to or from a specific fixed location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

omnidirectional example

A

a cellphone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Parabolic Antenna

A

type of unidirectional that gives specific curvature and is used in microwave signals and satellite TV

Ex: direct TV antennas

Going to a satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

2.4 GHz

A

most widely used, known for long range and better penetration through solid objects

slower data transfer speeds

tradeoff of speed versus distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Channel

A

physical medium through our wireless networks can send and receive data

virtual cable that sends data through airwaves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

2.4 GHz has what channels we can use?

A

11, 13, and 14

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

what 3 channels don’t overlap in 2.4 GHz?

A

1, 6, and 11

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

5 GHz Band

A

there’s 24 non-overlapping channels

better for video streaming and gaming

has a SHORTER RANGE and doesn’t penetrate solid objects as well

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

channel bonding

A

merge channels into two or more channels for more bandwidth

bond up to 8 channels in the 5 GHz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

6 GHz

A

new spectrum that gives faster connections with less congestion

good with high-density areas

least amount of solid object penetration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

802.11 standard was developed to comply with what

A

European regulations for wireless networking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

DFS - dynamic frequency selection

A

devices monitor environment for radar signals

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TPC - transmits power control

A

device adjust transmitting power to the minimum required for maintaining a good-quality connection

reduces interference and power consumption

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Band Steering

A

optimize the distribution of client devices across frequency bands (2.4 and 5)

use: when 2 or more frequency bands are being utilized by networking equipment

moves devices over to 5 or 6 so its less crowded to reduce interference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Higher speeds often come with
Reduced coverage distances for a single access point
26
6 GHz
802.11 ax
27
Wireless ac only supports what
5.0 GHz
28
Pre shared key or PSK
Using the same password or key Scalability is an issue - you’d have to change the psk every time someone is fired No user accountability because they’re not individually logged in
29
802.1X
Most widely used enterprise grade authentication method Users have to log in individually so we can do user tracking
30
WEP - wired equivalency Privacy
Original one NOT SECURE, DONT USE Relies on a pre shared key with a small key size (40) so it’s easy to brute force and break Uses RIVEST encryption method which is weak at security
31
Initialization Vector or IV
series of 24 1s and 0s sent in plain text over network NOT SECURE - EASY TO CRACK
32
33
What frequency bands are associated with 2.4 GHz?
b, g, n, and ax ## Footnote These are the wireless standards that operate on the 2.4 GHz frequency band.
34
What frequency bands are associated with 5 GHz?
a, n, ac, or ax ## Footnote These are the wireless standards that operate on the 5 GHz frequency band.
35
What frequency band is associated with 6 GHz?
ax ## Footnote This is the wireless standard that operates on the 6 GHz frequency band.
36
What does Wi-Fi Protected Access (WPA) replace?
WEP to address IV vulnerabilities
37
What protocol does WPA utilize to enhance security?
Temporal Key Integrity Protocol (TKIP)
38
What is a key feature of TKIP compared to WEP's IV?
Uses a longer 48-bit vector
39
What type of encryption does TKIP employ?
RC4 encryption
40
What is the purpose of Message Integrity Check (MIC)?
To prevent On-path attacks
41
How does MIC verify data integrity?
Hashes data before transmission
42
What is the Enterprise Mode in WPA?
Individual authentication using unique usernames and passwords via an authentication server
43
What are the benefits of the Enterprise Mode?
Stronger encryption methods, better scalability, centralized key management
44
What does WPA2 replace?
WPA due to vulnerabilities
45
When was WPA2 introduced?
2004 as part of the 802.11i standard
46
What is CCMP?
Counter mode with Cipher Blockchaining Message Authentication Code Protocol for enhanced security
47
What does CCMP combine for security?
Message integrity checks with comprehensive encryption protocols
48
What encryption algorithm does WPA2 use instead of RC4?
Advanced Encryption Standard (AES) provides more data security and confidentiality
49
What are the bit lengths available for AES in WPA2?
128-bit, 192-bit, 256-bit most WPA networks use 128-bit
50
What is the Personal mode in WPA2?
Mode with pre-shared key, common in home or small office networks
51
What is the preferred mode for larger environments in WPA2?
Enterprise mode utilizing centralized authentication servers relies on individual usernames and passwords
52
What is WPA3?
Introduced in 2018, improves upon WPA2 with enhanced features uses 192 and 256 bit
53
What does Simultaneous Authentication of Equals (SAE) enhance?
The handshake process used in wifi authentication
54
What authentication mechanism does SAE replace?
Pre-shared key methods
55
What does SAE ensure during the key exchange?
Secure initial key exchange preventing interception by attackers
56
How does SAE slow down brute force attacks?
Requires active interaction with the access point for each password attempt Ensures past communications remain securely encrypted if a session key is compromised
57
What does Wi-Fi Protected Setup (WPS) simplify?
Secure network setup using a PIN or push button can be used with NFC used for non technical users to set up secure networks (longer and stronger passwords creation) usually a button on the wireless access point
58
What vulnerability does WPS have?
Vulnerable to brute force attacks due to PIN vulnerability total possible combinations get down to 20k combinations which is easy to brute force
59
What is recommended for higher security regarding WPS?
Disable WPS
60
What is an open network?
No security measures
61
What are the key features of WEP?
Initialization Vector (IV) vulnerabilities
62
What encryption method does WPA use?
RC4 encryption
63
What does WPA2 use for integrity and encryption?
CCMP for integrity and AES for encryption
64
What does WPA3 introduce?
SAE and dragonfly key exchange
65
What is the function of a pre-shared key?
Personal mode authentication
66
What does Enterprise mode utilize for user authentication?
Centralized server (e.g., RADIUS with 802.1X)
67
What wireless encryption options should you not use
WEP, WPA, OR WPS
68
Any time you see OPEN in reference to a wireless network, that means? EXAM
Open networks are networks with no security, no protection, and no password they've chosen no encryption
69
WEP is associated with what encryption EXAM
associate this with Initialization Vector or IV
70
WPA is associated with what terms EXAM
TKIP and RC4
71
WPA2 is associated with what terms EXAM
CCMP and AES
72
WPA3 is associated with what EXAM
SAE and dragonfly key exchange
73
WPS is associated with what EXAM
push button configurations and should be disabled
74
PSK is associated with what EXAM
a password mode being used in your network
75
Enterprise Mode is associated with what EXAM
an individual username and password for each user
76
Temporal Key Integrity Protocol (TKIP)
A new type of vector that uses a longer 48-bit vector compared to WEP's IV
77
CCMP
Countermode with Cipher Blockchaining Message Authentication Code Protocol for enhanced security ○ Combines message integrity checks with comprehensive encryption protocols for confidentiality and integrity assurance
78
Why should we disable SSID broadcast?
Because with it enabled , we are broadcasting our device to everyone. Turning it off means people need to have our specific name to find us. Its a security measure
79
Enable MAC filtering
For more security So you can choose the specific devices to connect
80
Captive portal
Web pages shown to users before they're granted access to your network For guest access Hotels, airports, etc. Accept terms of service for authentication