Shared Flashcard Set

Details

CWNA Guide to Wireless LANs Unit 2
Chapters 5 - 8
94
Computer Networking
Undergraduate 2
03/27/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Both A and B
Definition
Why is CSMA/CD unsuitable for wireless networks?
Term
Mobile
Definition
____ IP provides mechanism within the TCP/IP protocol to support mobile computing by using a home agent as a forwarding mechanism to keep track of where the mobile computer is located.
Term
Frame control
Definition
The _____ field appears first in a management frame.
Term
Fragmentation
Definition
____ involves dividing the data to be transmitted from one large frame into several smaller ones.
Term
handoff
Definition
Which of the following describes a wireless device switching from one AP to another?
Term
continuous aware
Definition
When a laptop, either in ad hoc or infrastructure mode, is connected to a standard alternating current (AC) plug for power it is in _____ mode and remains in communication with the AP or other wireless devices.
Term
2
Definition
What is the minimum number of BSS networks required to form an ESS?
Term
802.11e
Definition
The ____ draft defines a superset of features that is intended to provide QoS over WLANs.
Term
foreign agent
Definition
With MobileIP, the ____ assigns the mobile computer a new (but temporary) IP number.
Term
True
Definition
A home agent is a forwarding mechanism that keeps track of where the mobile computer is located.
Term
True
Definition
When an ESS is installed it is desirable to configure the areas of coverage much like cells in a cellular telephone system.
Term
the one with the strongest signal strength
Definition
On ESS networks that have multiple access points, the wireless device might actually receive beacon frames from several APs. Which AP would a wireless device generally choose in this case?
Term
wireless device sends an authentication frame to the AP
Definition
What is the first step in shared key authentication?
Term
check sequence
Definition
All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection.
Term
a group of wireless devices that is served by a single access point
Definition
A BSS is ____.
Term
challenge text
Definition
A wireless device sends an authentication frame to the AP. The AP sends back an authentication frame that contains a block of text known as the ____________________.
Term
Frame check sequence
Definition
The ____ field appears last in a data frame.
Term
short
Definition
The RTS/CTS protocol is especially taxing when ____ data packets are being transmitted.
Term
open system
Definition
What is the default authentication method according to the 802.11 standard?
Term
1
Definition
Intel recommends that once the ROI model is complete, larger organizations should return to step ____.
Term
802.11b
Definition
Only in areas where low bandwidth is acceptable or an ad hoc wireless network will be used should ____ networks be considered.
Term
True
Definition
Several vendors are working on comprehensive network management solutions that integrate wireless networks into the same deployment, operations, and management as a wired network.
Term
Hard
Definition
____________________ benefits are benefits that can be easily measured or quantified.
Term
15
Definition
In a 802.11b network, how many power users should be associated with one access point?
Term
gateway
Definition
Wireless ____________________ provide a single mechanism for managing and monitoring the wireless network.
Term
channel
Definition
Two adjacent access points that use the same ____ can cause interference and lost frames.
Term
False
Definition
Early adopters of wireless LANs were sometimes called “racehorses”.
Term
Maintaining a help desk
Definition
____ is one of the most effective strategies for providing support for a new wireless network.
Term
develop a report
Definition
What is the second step in the wireless LAN model developed by Intel?
Term
types of clients
Definition
Which of the following should be included when documenting current network setup?
Term
hotspot
Definition
A(n) ____ provides wireless LAN service, for free or for a fee, from a variety of public areas, including coffee shops, public libraries, and airport lounges.
Term
user Power over Ethernet
Definition
What should you do when electrical alternating current power is not available near the AP location?
Term
All of the above
Definition
____ should be considered when calculating ROI.
Term
personal networked computer
Definition
What is the single most important tool in any business?
Term
87
Definition
According to NOP-World Technology, ____ percent of end users said that a WLAN improves their quality of life by increasing flexibility and productivity, and saving time.
Term
1.75
Definition
According to a study conducted by NOP World–Technology, wireless LANs enable users to be connected to network resources ____ additional hours per day.
Term
1, 6, and 11
Definition
Which channels in IEEE 802.11b and 802.11g networks do not overlap?
Term
Cost reduction
Definition
____ is considered a hard benefit.
Term
note the objects and layout of the room
Definition
What is the first step in collecting RF information?
Term
False
Definition
The industry-standard form for site survey documentation is IEEE 802.11D.
Term
to ensure that the new or expanded wireless LAN will “dovetail” into what is already in place
Definition
Why is it important to document existing wired and wireless networks?
Term
mirror
Definition
What provides the greatest source of RF interference?
Term
data rate boundaries
Definition
The term ____ describes the rate of transmission falling as the device moves farther from the AP.
Term
bandwidth
Definition
Users need higher data rates for time-bound transmissions, such as audio and video and therefore need higher ____________________.
Term
Token Ring
Definition
Which network requires some sort of gateway or interface to be compatible with IEEE 802.11 WLANs?
Term
prior to installing a WLAN
Definition
When is the best time to perform a site survey?
Term
True
Definition
A drawback of spectrum analyzers is that the information is displayed in graphical form and not as raw data.
Term
Destination MAC
Definition
The ____ setting of a site survey analyzer specifies the AP that will be involved in the test.
Term
inspecting the site
Definition
What is the best way to gather site-specific documentation?
Term
RSSI
Definition
In a site survey analyzer, vendors use an algorithm or a lookup table to convert ____ values to dBm, mW, or signal strength percentage.
Term
distance and objects in path
Definition
What affects transmission range?
Term
interviewing management
Definition
How are business requirements for a WLAN obtained?
Term
pattern
Definition
The coverage ____________________ is the area in which the signal can be received from the AP.
Term
range
Definition
The transmission ____________________ is the farthest distance at which the signal can be received by the wireless device.
Term
All of the above
Definition
You would use ____ in documenting a site survey.
Term
False
Definition
The first step in collecting RF information is to position the access point in what may appear to be the most logical location.
Term
True
Definition
It is important to evaluate the placement of the access points and antennas throughout the proposed site in order to meet the design goals.
Term
True
Definition
Information security involves more than protecting the information itself.
Term
spoof
Definition
MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address.
Term
plaintext
Definition
When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____.
Term
stream
Definition
RC4 is a ____ cipher that accepts keys up to 128 bits in length.
Term
00002
Definition
In a brute force attack, what key combination would follow 00001?
Term
keystream
Definition
A ____ attack on WEP involves viewing collisions to derive plaintext values.
Term
True
Definition
Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard.
Term
confidentiality
Definition
Which aspect of information security does WEP protect?
Term
40
Definition
In a 64-bit packet sent using WEP, how many bits are actually encrypted?
Term
day zero
Definition
While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
Term
control
Definition
Access ____________________ is intended to guard one of the three CIA characteristics of information, namely the availability of information.
Term
checksum
Definition
In WEP, the CRC generates a(n) ____ based on the contents of the text.
Term
hacker
Definition
A ____ is not malicious but often seeks to expose security flaws.
Term
1,000,000
Definition
A standard personal computer can easily create over ____ possible password combinations per second.
Term
disassociation
Definition
A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device.
Term
man-in-the-middle
Definition
On wireless networks, ____ attacks are commonly done by attackers setting up a “fake” access point.
Term
All of the above
Definition
Which type of attacker typically has a high skill level?
Term
security
Definition
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology?
Term
Computer Emergency Response Team Coordination Center (CERT/CC)
Definition
____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University.
Term
filter
Definition
limit a user’s admission to the access point
Term
hacker
Definition
person who uses his or her advanced computer skills to attack computers but not with a malicious intent
Term
default key
Definition
key value that is used to encrypt wireless data transmissions when they are sent
Term
cipher
Definition
encryption algorithm
Term
cracker
Definition
person who violates system security with malicious intent
Term
jam
Definition
attacker floods the radio frequency spectrum with noise
Term
script kiddies
Definition
unskilled or novice users who break into computer systems with malicious intent
Term
keystream
Definition
series of 1’s and 0’s equal in length to the text plus the ICV
Term
computer spy
Definition
person who has been hired to break into a computer and steal information
Term
transmission range
Definition
the farthest distance at which the signal can be received by the wireless device
Term
multicast
Definition
frame is sent from one sender to multiple receivers with a single “transmit” operation
Term
coverage pattern
Definition
area in which the signal can be received from the AP
Term
unicast
Definition
frame is sent from one sender to a single receiver
Term
network analyzer
Definition
used to pick up any packets that are being transmitted by other WLANs in the area and can provide additional information on transmissions
Term
spectrum analyzer
Definition
scans the radio frequency spectrum and provides a graphical display of the results
Term
site survey analyzer
Definition
measurement tool that is specifically designed for conducting a wireless LAN site survey
Term
data rate boundary
Definition
range of coverage for a specific transmission speed
Term
packet throughput
Definition
number of packets sent and received and the data rates for each
Supporting users have an ad free experience!