Wireless LANs

Card Set Information

Author:
gbird
ID:
193717
Filename:
Wireless LANs
Updated:
2013-01-20 01:38:20
Tags:
Wireless LANs
Folders:

Description:
Wireless LANs
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user gbird on FreezingBlue Flashcards. What would you like to do?


  1. Who developed the series of standards that defines WLANs?
    • InternationalTelecommunication Union-Radio Communication Sector (ITU-R)
    • Institute ofElectrical and Electronics Engineers (IEEE)
    • Wi-Fi Alliance
    • FederalCommunications Commission (FCC)
  2. What are the unlicensed radio bands?
    • 900MHz
    • 2.4GHz
    • 5GHz
  3. What is the name of the 900MHz unlicensed radio band?
    ISM
  4. What is the name of the 2.4GHz unlicensed radio band?
    ISM
  5. What is the name of the 95GHz unlicensed radio band?
    U-NII
  6. Which unlicensed radio bands are named ISM?
    • 900MHz
    • 2.4GHz
  7. Which unlicensed radio band is named U-NII?
    5GHZ
  8. What are some of the uses of the 900MHz unlicensed radio band?
    • Older cordelss phones
    • GSM cell phones
  9. What are some of the uses of the 2.4GHz unlicensed radio band?
    • 802.11
    • 802.11b
    • 802.11g
    • 802.11n
  10. What are some of the uses of the 5GHz unlicensed radio band?
    • 802.11a
    • 802.11n
  11. Which unlicensed radio band is used for Older cordelss phones and GSM cell phones?
    900MHz
  12. Which unlicensed radio band is used for 802.11, 802.11b, 802.11g, 802.11n?
    2.4GHz
  13. Which unlicensed radio band is used for 802.11a, 802.11n?
    5GHz
  14. Which unlicensed radio bands is use 802.11n?
    • 2.4GHz
    • 5GHz
  15. What does ISM stand for?
    Industrial,Scientific, Medical
  16. What does U-NII stand for?
    Unlicensed National Information Infrastructure
  17. What year was 802.11 standardized?
    1997
  18. What year was 802.11a standardized?
    1999
  19. What year was 802.11b standardized?
    1999
  20. What year was 802.11g standardized?
    2003
  21. What year was 802.11n standardized?
    2008
  22. Which 802.11 was standardized in 1997?
    802.11
  23. Which 802.11 was standardized in 1999?
    • 802.11a
    • 802.11b
  24. Which 802.11 was standardized in 2003?
    802.11g
  25. Which 802.11 was standardized in 2008?
    802.11n
  26. What is the 802.11 standard also known as?
    legacy
  27. What is the max speed for 802.11?
    11Mbps
  28. How many channels does 802.11 use?
    11
  29. Which radio frequency does 802.11 use?
    2.4GHz
  30. What is FHSS?
    arandom, rapid sequence to statistically avoid interference from other devicesusing the same frequencies
  31. What is the max speed for 802.11a for FHSS?
    11Mbps
  32. What is the max speed for 802.11n for FHSS?
    11 Mbps per stream
  33. What is the max speed for 802.11a for OFDM?
    54Mbps
  34. What is the max speed for 802.11g for OFDM?
    54Mbps
  35. What is the max speed for 802.11n for OFDM?
    600Mbps
  36. What is the assigned frequency for 802.11?
    2.4GHz
  37. What is the assigned frequency for 802.11a?
    5GHz
  38. What is the assigned frequency for 802.11b?
    2.4GHz
  39. What is the assigned frequency for 802.11g?
    2.4GHz
  40. What is the assigned frequency for 802.11n?
    • 2.4GHz
    • 5GHz
  41. Which 802.11s use frequency 2.4GHz?
    • 802.11
    • 802.11b
    • 802.11g
    • 802.11n
  42. Which 802.11s use frequency 5GHz?
    • 802.11a
    • 802.11n
  43. How many channels are available for 802.11?
    11
  44. How many channels are available for 802.11a?
    23
  45. How many channels are available for 802.11b?
    11
  46. How many channels are available for 802.11g?
    11
  47. How many channels are available for 802.11n?
    • 11
    • 23
  48. Which 802.11s have 11 channels available?
    • 802.11
    • 802.11b
    • 802.11g
    • 802.11n
  49. Which 802.11s have 23 channels available?
    • 802.11a
    • 802.11n
  50. What is the range for 802.11?
    75 feet
  51. What is the range for 802.11a?
    75 feet
  52. What is the range for 802.11b?
    150 feet
  53. What is the range for 802.11g?
    150 feet
  54. What is the range for 802.11n?
    500 feet
  55. Which 802.11s has a range of 75 feet?
    • 802.11
    • 802.11a
  56. Which 802.11s has a range of 150 feet?
    • 802.11b
    • 802.11g
  57. Which 802.11s has a range of 500 feet?
    802.11n
  58. Which 802.11s are OFDM?
    • 802.11a
    • 802.11g
    • 802.11n
  59. Which 802.11s are FHSS?
    • 802.11a
    • 802.11n
  60. What is a big advantage of using 5GHz frequency?
    • it is immune to common 2.4GHz emissions, such as from cordless phones, babymonitors, microwave ovens, and many of the wireless conveniences we take for granted that can really interfere with WLAN transmissions in the 2.4GHz range.
    • higherfrequencies mean smaller antennas, which means we can increase the antenna gain
  61. What is a big disadvantage of using 5GHz frequency?
    the higher frequencies are more easily absorbed by structures and furniture,reducing the effective range
  62. Why is it that mostly enterprise customers who like 802.11a?
    because it never caught on with the general public so the risk of interference and security breaches was reduced.
  63. What is the actual frequency range used in 2.4GHz WLANs?
    2.402 - 2.4382
  64. Which WLAN technology hit the market first, 802.11a or 802.11b?
    802.11b
  65. What are the typical channels used for 2.4GHZ WLANs and why?
    • 1
    • 6
    • 11
    • These channels do not cross each other like the other channels do.
  66. Which 802.11 is considered DSSS?
    802.11b
  67. What does DSSS stand for?
    Direct Sequence Spread Spectrum
  68. What does OFDM stand for?
    OrthogonalFrequency Division Multiplexing
  69. What does FHSS stand for?
    FrequencyHopping Spread Spectrum
  70. Which 802.11 standard is the most popular?
    802.11g
  71. What are the different WLAN operational modes?
    • Ad Hoc Mode
    • Infrastructure Mode
  72. What is Ad Hoc mode?
    A connection establed between only 2 devices directly without the use of an AP.
  73. What is Infrastucture mode?
    an AP is required because the client devices cannot send directly to each other;they must send through the AP. The AP, in turn, handles all the wireless client data and provides the connection to the wired LAN by way of its connection tothe switch.
  74. What are the 2 distinctions that Cisco makes within infrastructure mode?
    • Autonomous Mode
    • Lightweight Mode
  75. What is Autonomous Mode?
    each AP is managed separately and sends wireless client data into the networkitself.
  76. What is Lightweight Mode?
    each AP associates with a WLAN controller, a special device that provides a singlepoint for management and security of multiple APs in the network.
  77. What is the protocol used that a WLAN controller uses to manage APs in Lightweight mode?
    LightweightAccess Point Protocol (LWAPP)
  78. What does BSS stand for?
    Basic Service Set
  79. What does ESS stand for?
    Extended Service Set
  80. What is a BSS configuration?
    a single AP that provides network connectivity for its associated clients.
  81. What is an ESS configuration?
    eachAP still defines a BSS, but the group of APs and their BSSs form the ESS. Themain advantage is that clients can roam between the overlapping coverage areasof the individual APs' BSSs, without losing the functionality of theirconnection to the ESS and thus to the network.
  82. What does SSID stand for?
    Service Set Identifier
  83. What is an SSID?
    just a name for a WLAN
  84. What are the threats to WLANs?
    • War Driving
    • Hackers
    • Internal
    • Rogue APs
  85. What is War Driving?
    refers to driving around with a laptop, looking for unsecured APs to connect to and get free Internet access.
  86. Why are hackers a threat?
    they are looking for interesting or useful information such as credit card numbersor other protected data, or else they just want to mess up someone's networkout of malice or boredom.
  87. What is an internal threat?
    malicious or ignorant actions by the company's own employees. The classic example is the employee who buys a little AP and plugs it into the network drop in their office. The defaults on consumer APs are typically no security at all; now a hacker can connect easily and steal access or information.
  88. What is a rogue AP?
    APs put in place in a WLAN without authorization.
  89. What are the WLAN security Methods?
    • Authentication
    • Encryption
    • Intrusion Detection/Intrusion Prevention
  90. How does Authentication provide security?
    requires all clients connecting to an AP to provide some (hopefully secret) information called a key to prove that they are authorized to connect
  91. How does Encryption provide security?
    encrypting it into a stream of gibberish that only another device with the correct key anddecryption formula can unscramble.
  92. How does Intrusion Detection and Intrusion Prevention provide security?
    Cisco's Structured Wireless-Aware Network architecture (SWAN) includes several devices and tools that improve the manageability and security of WLANs.  They detect Rogue APs and shuts them down.
  93. What are the WLAN Security Standards?
    • WEP
    • WPA
    • 802.11i/WPA2
  94. What does WEP stand for?
    Wired Equivalent Privacy
  95. What does WEP do?
    WEP uses a static preshared key system, meaning that all the APs and all the clientsmust have the same key string configured in order to authenticate and transmitencrypted data.
  96. What is the problem with using WEP?
    • itis an administrative headache to change the keys, which means they don't changeoften, which is not good.
    • theencryption method used was pretty weak
  97. Should WEP be considered aviable security method in current WLAN deployments?
    no
  98. What solution to WEPs problems did Cisco create?
    ExtensibleAuthentication Protocol (EAP)
  99. What improvemnts did Cisco make with EAP over WEP?
    • Dynamic Key Exchange
    • User Authentication with 802.1x
    • Unique Key per Packet
  100. How does Dynamic Key Exchange improve security?
    it allows the key to be secretly agreed upon by the devices themselves
  101. How does Authentication with 802.1x improve security?
    requiring the user to supply a username/ password package when attempting to connect
  102. What does WPA stand for?
    Wi-Fi Protected Access
  103. Who designed WPA?
    IEEE
  104. How does WPA use Dynamic keying that cisco does not?
    TemporalKey Integrity Protocol (TKIP)
  105. What security method did IEEE release in 2005 that uses dynamic keying,authentication, and very strong encryption using the Advanced EncryptionStandard (AES) algorithm?
    802.11i
  106. What is 802.11i?
    • A security feature that includes:
    • Dynamic Keying
    • Authentication
    • Advanced Encryption Standard (AES) algorithm
  107. is 802.11i backward compatible?
    no
  108. Whaqt dows the Wi-Fi Alliance call 802.11i?
    WPA2

What would you like to do?

Home > Flashcards > Print Preview