Term
Client systems communicate with a wireless access point using a ___ ___ adapter. |
|
Definition
|
|
Term
A wireless access point is both a ___ and ___ of wireless LAN (WLAN) radio signals. |
|
Definition
transmitter receiver (transceiver) |
|
|
Term
Access points use the ___ ___ network mode to provide a connection between a WLAN and a wired Ethernet LAN. |
|
Definition
|
|
Term
Access points typically have several ___s which can be used to expand the network to support additional clients. |
|
Definition
|
|
Term
An Access Point can operate as a ___, connecting a standard wired network to wireless devices, or as a ___, passing data transmissions from one access point to another. |
|
Definition
|
|
Term
In the ___ mode, the AP receives transmissions from wireless devices and transmits those signals to the network. |
|
Definition
|
|
Term
The ___ ___ ___ is a network name needed to connect to a wireless AP. |
|
Definition
Service Set Identifier (SSID) |
|
|
Term
___ ___ ___ is a wireless network that uses a single AP with one or more wireless clients connecting to the AP. |
|
Definition
|
|
Term
The BSS is an example of the ___ wireless topology. |
|
Definition
|
|
Term
___ ___ ___ is two or more connected BSSs that use multiple APs. |
|
Definition
Extended Service Set (ESS) |
|
|
Term
The ___ ___ ___ is used to create WLANs or larger wireless networks and is a collection of APs and clients. |
|
Definition
Extended Service Set (ESS) |
|
|
Term
___ ___ ___ systems enables clients to roam between areas and maintain the wireless connection without having to reconfigure between BSSs. |
|
Definition
Extended Service Set (ESS) |
|
|
Term
___ is the network name used with an ESS wireless network design. |
|
Definition
|
|
Term
True or False? With an ESS, all APs must use the same ESSID. |
|
Definition
|
|
Term
The __ __ __ __ is the MAC address of the Basic Service Set (BSS) AP |
|
Definition
Basic Service Set Identifier (BSSID) |
|
|
Term
The ___ ___ ___ is the coverage area of an AP. |
|
Definition
|
|
Term
An antenna's ___ value is the difference between the 0dBi isotropic and the antenna's power. |
|
Definition
|
|
Term
A higher gain value means stronger send and receive signals. The rule of thumb is that every __dB of gain added doubles an antenna's effective power output. |
|
Definition
|
|
Term
An ___ antenna is designed to provide a 360-degree dispersed wave pattern. This type of antenna is used when coverage in all directions from the antenna is required. |
|
Definition
|
|
Term
A ___ antenna is designed to focus the signal in a particular direction. |
|
Definition
|
|
Term
True or False? Omnidirectional antennas provide wide coverage but weaker signal strength in any one direction than a directional antenna. |
|
Definition
|
|
Term
One ___ is equal to one cycle per second. |
|
Definition
|
|
Term
The 802.11__ standard specifies radio frequency ranges between 5.15 and 5.875GHz. |
|
Definition
|
|
Term
802.11__ and 802.11__ standards operate in the 2.4 to 2.497GHz range. |
|
Definition
|
|
Term
802.11a has a wider frequency band that enables more ___s and therefore more data throughput. |
|
Definition
|
|
Term
802.11a supports up to __ nonoverlapping channels. 802.11b/g standards support up to __ nonoverlapping channels. |
|
Definition
|
|
Term
Most wireless device manufacturers set their default channel to one of the ___ channels to avoid transmission conflicts. |
|
Definition
|
|
Term
In Windows, you use the ___ command to see the status of IP configuration. |
|
Definition
|
|
Term
In Linux, you use the ___ command to see the status of IP configuration. |
|
Definition
|
|
Term
Linux uses the ___ command to view additional IP info such as the link quality, AP MAC address, data rate, and encryption keys.. |
|
Definition
|
|
Term
802.11__ added multiple-input multiple-output antennas (MIMO) to produce a huge increase in the data rate. |
|
Definition
|
|
Term
Wireless channels __, __ and __ do not overlap. |
|
Definition
|
|
Term
___ ___ refers to the theoretical maximum of a wireless standard, such as 100Mbps. |
|
Definition
|
|
Term
___ refers to the actual speeds achieved on a wireless network after all implementation and interference factors. |
|
Definition
|
|
Term
In practical application, wireless transmission speeds are about __% or less of the data rate. |
|
Definition
|
|
Term
Wireless clients automatically search for the ___ ___ frame and attempt to establish a wireless connection to the access point. |
|
Definition
beacon management frame (beacon) |
|
|
Term
The beacon frame is sent by the access point in an ___ network design. Client stations send beacons only if connected in an ___ ___ network design. |
|
Definition
|
|
Term
The two methods of AP discovery are ___ scanning and ___ scanning. |
|
Definition
|
|
Term
With ___ scanning, the client system listens for beacon frames to discover an AP. After it is detected, the beacon frame provides the information necessary for the system to access the AP. |
|
Definition
|
|
Term
With ___ scanning, the client station transmits a management frame known as a probe request. All APs with the same SSID reply with a probe response, which enables the client to access the system. |
|
Definition
|
|
Term
With ___-spectrum, data does not travel straight through a single RF band; instead, data signals either alternate between carrier frequencies or constantly change their data pattern. |
|
Definition
|
|
Term
With a ___ transmission, data travels through a single RF band. |
|
Definition
|
|
Term
___-___ signal strategies use more bandwidth than narrowband but the trade-off is a data signal that is clearer and easier to detect. |
|
Definition
|
|
Term
The two types of spread-spectrum radio are ___ ___ and ___ ___. |
|
Definition
frequency hopping direct sequence |
|
|
Term
__-__ __-__ technology requires the use of narrowband signals that change frequencies in a predictable pattern. |
|
Definition
Frequency-Hopping Spread-Spectrum (FHSS) |
|
|
Term
Data signals using __-__ __-__ technology have a strong resistance to interference and environmental factors, which works well for installations covering large geographic areas and where using directional antennas is not possible. |
|
Definition
Frequency-Hopping Spread-Spectrum (FHSS) |
|
|
Term
With __-__ Spread-Spectrum, the signal is spread over a full transmission frequency spectrum. |
|
Definition
Direct-Sequence Spread-Spectrum (DSSS) |
|
|
Term
With DSSS transmissions, for every bit of data sent a redundant bit pattern is also sent. This 32-bit pattern is called a ___. |
|
Definition
|
|
Term
__-__ __-__ transmissions minimize the effects of interference and background noise. |
|
Definition
Direct-Sequence Spread-Spectrum (DSSS) |
|
|
Term
DSSS provides better ___ and signal delivery than FHSS, but it is a sensitive technology that is affected by many ___ factors. |
|
Definition
|
|
Term
___ ___ ___ ___ transmissions transfer large amounts of data over 52 separate, evenly spaced frequencies. |
|
Definition
Orthogonal Frequency Division Multiplexing (OFDM) |
|
|
Term
By splitting the signal and transferring it over different frequencies, OFDM reduces the amount of ___ interference. |
|
Definition
|
|
Term
A ___ infrared system provides a limited range of about 3 feet and typically is used for personal area networks. |
|
Definition
|
|
Term
___ infrared systems do not require line of sight, but usable distance is limited to room distances. |
|
Definition
|
|
Term
Infrared provides a secure, low-cost, convenient alternative to ___ technology. |
|
Definition
|
|
Term
In an ___ wireless network design, the network has two key parts: the wireless client, also known as the station (STA), and the AP. The AP acts as a bridge between the STA and the wired network. |
|
Definition
|
|
Term
The ___ process occurs when a wireless adapter is turned on and begins scanning the wireless frequencies for wireless APs or, if using ad hoc mode, other wireless devices. |
|
Definition
|
|
Term
If the wireless signal drops below an acceptable level, the wireless adapter initiates another scan, looking for an AP with stronger signals. This is known as ___. |
|
Definition
|
|
Term
When the association process is complete, the ___ process begins. |
|
Definition
|
|
Term
On many APs, authentication can be set to either ___ key or ___ key. |
|
Definition
|
|
Term
___ authentication enables access with only the SSID and/or the correct WEP key for the AP. |
|
Definition
|
|
Term
When set to ___ ___ mode, the client must meet security requirements before communication with the AP can occur. |
|
Definition
|
|
Term
When association and authentication are complete, the system is said to have achieved established __-level communication and Ethernet networking takes over. |
|
Definition
|
|
Term
___ ___ filtering can be used to limit access to specified hosts. |
|
Definition
|
|
Term
___-___ is the simplest method of authentication because it does not perform any type of client verification. It is a weak form of authentication because it requires no proof of identity. |
|
Definition
|
|
Term
___-___ authentication requires that a WEP key be configured on both the client system and the access point. This makes authentication mandatory, so it is more secure for wireless transmission. |
|
Definition
|
|
Term
___-___ is a form of encryption in which keys are automatically changed and authenticated between devices after a specified period of time, or after a specified number of packets have been transmitted. |
|
Definition
WPA-psk (Wi-Fi Protected Access with Pre-Shared Key) |
|
|
Term
Multiple broadcast messages are known as ___ or ___ traffic. |
|
Definition
|
|
Term
__ __ __ __ ensures that when the multicast or broadcast traffic is sent, all systems are awake to hear the message. |
|
Definition
Delivery Traffic Indication Message (DTIM) |
|
|
Term
The DTIM setting specifies how often the DTIM is sent within the ___ frame. |
|
Definition
|
|
Term
802.11a, b, g and n all use the ___ protocol and the ___ access method. |
|
Definition
|
|
Term
All 802.11 standards can use either a ___ or ___ ___ network design, and each can use the same ___ protocols. |
|
Definition
infrastructure ad hoc security |
|
|
Term
___ specifies speeds of up to 54Mbps in the 5GHz band. |
|
Definition
|
|
Term
True or False? 802.11a is incompatible with 802.11b and 802.11g. |
|
Definition
|
|
Term
___ specifies speeds of up to 11Mbps in the 2.4GHz band. |
|
Definition
|
|
Term
___ specifies speeds of up to 54Mbps in the 2.4GHz band. |
|
Definition
|
|
Term
True or False? 802.11g is compatible with 802.11b |
|
Definition
|
|
Term
___ specifies speeds of up to 100Mbps in either the 2.4GHz or 5GHz band. |
|
Definition
|
|
Term
In 802.11n, ___ is used to increase the range and speed of wireless networking. |
|
Definition
|
|
Term
___ combines multiple signals for transmission over a single line or medium. |
|
Definition
|
|
Term
802.11b and 802.11g use a single channel to send and receive information. 802.11n uses ___ ___ to use two channels at the same time. |
|
Definition
|
|
Term
In wireless networking a single channel is ___ MHz wide. When two channels are bonded, they have a total width of __MHz. |
|
Definition
|
|
Term
___ ___ Protocol provides security by encrypting data from both sending and receiving devices. |
|
Definition
Wired Equivalency Protocol |
|
|
Term
___ WEP uses the same security key on an ongoing basis. ___ WEP changes security keys periodically, making it more secure. |
|
Definition
|
|
Term
WEP uses ___ ___ Protocol to regulate access to a wireless network based on a computer’s MAC address, which is relatively simple to steal. |
|
Definition
Extensible Authentication Protocol (EAP) |
|
|
Term
WPA uses a ___ ___ ___ protocol that scrambles encryption keys using a hashing algorithm. |
|
Definition
Temporal Key Integrity Protocol (TKIP) |
|
|
Term
Known as ___, the 802.11i standard provides security enhancements to the wireless standard with particular focus on authentication. |
|
Definition
|
|
Term
True or False? WPA is compatible with older wireless cards; WPA2 is not. |
|
Definition
|
|
Term
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) uses 128-bit AES encryption with a 48-bit initialization vector to increase the difficulty in ___ and minimize the risk of ___. |
|
Definition
|
|
Term
___ uses TKIP, whereas ___ uses CCMP. |
|
Definition
|
|
Term
___ ___ security, also known as 802.1X, specifies port-based network access control. |
|
Definition
|
|
Term
Used for both wired and wireless networks, ___ ___ uses the physical characteristics of a switched local area network (LAN) infrastructure to authenticate devices attached to a LAN port and to prevent access to that port in cases where authentication fails. |
|
Definition
|
|
Term
In the 802.1X framework, the ___ is the system or node requesting access and authentication to a network resource |
|
Definition
|
|
Term
In the 802.1X framework, the ___ is the control mechanism that allows or denies traffic that wants to pass through a port |
|
Definition
|
|
Term
In the 802.1X framework, the ___ ___ validates the credentials of the supplicant that is trying to access the network or resource |
|
Definition
|
|
Term
With port-based network access control, a LAN port adopts one of two roles: ___ or ___. |
|
Definition
|
|
Term
A ___ server checks the supplicant’s credentials on behalf of the authenticator. |
|
Definition
|
|
Term
The authenticator’s ___-based network access control defines two logical access points to the LAN through one physical LAN port. |
|
Definition
|
|
Term
In the 802.1X framework, the first logical access point is the ___ed port, which enables data exchange between the authenticator and other computers on the LAN regardless of the computer's authorization state. |
|
Definition
|
|
Term
In the 802.1X framework, the second logical access point is the ___ed port, which enables data exchange between an authenticated LAN user and the authenticator. |
|
Definition
|
|
Term
In a wireless network environment, the ___ typically is a network host. |
|
Definition
|
|
Term
In a wireless network environment, the ___ could be the wireless network switch or AP. |
|
Definition
|
|
Term
True or False? WPA Enterprise is synonymous with 802.1X |
|
Definition
|
|
Term
True or False? By default, wireless devices are configured to use the strongest, fastest signal. |
|
Definition
|
|
Term
Connectivity problems among wireless devices can be solved by using a lower ___ rate in a ___ mode to achieve a more stable connection. |
|
Definition
|
|
Term
True or False? The higher the transfer rate, the longer the connection distance. |
|
Definition
False
The higher the transfer rate, the SHORTER the connection distance. |
|
|
Term
If connections are inconsistent, try changing the channel to another, ___ channel. |
|
Definition
|
|
Term
The most severe wireless obstacles indoors are ___, ___ and ___. |
|
Definition
|
|