Term
|
Definition
Why is CSMA/CD unsuitable for wireless networks? |
|
|
Term
|
Definition
____ IP provides mechanism within the TCP/IP protocol to support mobile computing by using a home agent as a forwarding mechanism to keep track of where the mobile computer is located. |
|
|
Term
|
Definition
The _____ field appears first in a management frame. |
|
|
Term
|
Definition
____ involves dividing the data to be transmitted from one large frame into several smaller ones. |
|
|
Term
|
Definition
Which of the following describes a wireless device switching from one AP to another? |
|
|
Term
|
Definition
When a laptop, either in ad hoc or infrastructure mode, is connected to a standard alternating current (AC) plug for power it is in _____ mode and remains in communication with the AP or other wireless devices. |
|
|
Term
|
Definition
What is the minimum number of BSS networks required to form an ESS? |
|
|
Term
|
Definition
The ____ draft defines a superset of features that is intended to provide QoS over WLANs. |
|
|
Term
|
Definition
With MobileIP, the ____ assigns the mobile computer a new (but temporary) IP number. |
|
|
Term
|
Definition
A home agent is a forwarding mechanism that keeps track of where the mobile computer is located. |
|
|
Term
|
Definition
When an ESS is installed it is desirable to configure the areas of coverage much like cells in a cellular telephone system. |
|
|
Term
the one with the strongest signal strength |
|
Definition
On ESS networks that have multiple access points, the wireless device might actually receive beacon frames from several APs. Which AP would a wireless device generally choose in this case? |
|
|
Term
wireless device sends an authentication frame to the AP |
|
Definition
What is the first step in shared key authentication? |
|
|
Term
|
Definition
All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection. |
|
|
Term
a group of wireless devices that is served by a single access point |
|
Definition
|
|
Term
|
Definition
A wireless device sends an authentication frame to the AP. The AP sends back an authentication frame that contains a block of text known as the ____________________. |
|
|
Term
|
Definition
The ____ field appears last in a data frame. |
|
|
Term
|
Definition
The RTS/CTS protocol is especially taxing when ____ data packets are being transmitted. |
|
|
Term
|
Definition
What is the default authentication method according to the 802.11 standard? |
|
|
Term
|
Definition
Intel recommends that once the ROI model is complete, larger organizations should return to step ____. |
|
|
Term
|
Definition
Only in areas where low bandwidth is acceptable or an ad hoc wireless network will be used should ____ networks be considered. |
|
|
Term
|
Definition
Several vendors are working on comprehensive network management solutions that integrate wireless networks into the same deployment, operations, and management as a wired network. |
|
|
Term
|
Definition
____________________ benefits are benefits that can be easily measured or quantified. |
|
|
Term
|
Definition
In a 802.11b network, how many power users should be associated with one access point? |
|
|
Term
|
Definition
Wireless ____________________ provide a single mechanism for managing and monitoring the wireless network. |
|
|
Term
|
Definition
Two adjacent access points that use the same ____ can cause interference and lost frames. |
|
|
Term
|
Definition
Early adopters of wireless LANs were sometimes called “racehorses”. |
|
|
Term
|
Definition
____ is one of the most effective strategies for providing support for a new wireless network. |
|
|
Term
|
Definition
What is the second step in the wireless LAN model developed by Intel? |
|
|
Term
|
Definition
Which of the following should be included when documenting current network setup? |
|
|
Term
|
Definition
A(n) ____ provides wireless LAN service, for free or for a fee, from a variety of public areas, including coffee shops, public libraries, and airport lounges. |
|
|
Term
|
Definition
What should you do when electrical alternating current power is not available near the AP location? |
|
|
Term
|
Definition
____ should be considered when calculating ROI. |
|
|
Term
personal networked computer |
|
Definition
What is the single most important tool in any business? |
|
|
Term
|
Definition
According to NOP-World Technology, ____ percent of end users said that a WLAN improves their quality of life by increasing flexibility and productivity, and saving time. |
|
|
Term
|
Definition
According to a study conducted by NOP World–Technology, wireless LANs enable users to be connected to network resources ____ additional hours per day. |
|
|
Term
|
Definition
Which channels in IEEE 802.11b and 802.11g networks do not overlap? |
|
|
Term
|
Definition
____ is considered a hard benefit. |
|
|
Term
note the objects and layout of the room |
|
Definition
What is the first step in collecting RF information? |
|
|
Term
|
Definition
The industry-standard form for site survey documentation is IEEE 802.11D. |
|
|
Term
to ensure that the new or expanded wireless LAN will “dovetail” into what is already in place |
|
Definition
Why is it important to document existing wired and wireless networks? |
|
|
Term
|
Definition
What provides the greatest source of RF interference? |
|
|
Term
|
Definition
The term ____ describes the rate of transmission falling as the device moves farther from the AP. |
|
|
Term
|
Definition
Users need higher data rates for time-bound transmissions, such as audio and video and therefore need higher ____________________. |
|
|
Term
|
Definition
Which network requires some sort of gateway or interface to be compatible with IEEE 802.11 WLANs? |
|
|
Term
prior to installing a WLAN |
|
Definition
When is the best time to perform a site survey? |
|
|
Term
|
Definition
A drawback of spectrum analyzers is that the information is displayed in graphical form and not as raw data. |
|
|
Term
|
Definition
The ____ setting of a site survey analyzer specifies the AP that will be involved in the test. |
|
|
Term
|
Definition
What is the best way to gather site-specific documentation? |
|
|
Term
|
Definition
In a site survey analyzer, vendors use an algorithm or a lookup table to convert ____ values to dBm, mW, or signal strength percentage. |
|
|
Term
distance and objects in path |
|
Definition
What affects transmission range? |
|
|
Term
|
Definition
How are business requirements for a WLAN obtained? |
|
|
Term
|
Definition
The coverage ____________________ is the area in which the signal can be received from the AP. |
|
|
Term
|
Definition
The transmission ____________________ is the farthest distance at which the signal can be received by the wireless device. |
|
|
Term
|
Definition
You would use ____ in documenting a site survey. |
|
|
Term
|
Definition
The first step in collecting RF information is to position the access point in what may appear to be the most logical location. |
|
|
Term
|
Definition
It is important to evaluate the placement of the access points and antennas throughout the proposed site in order to meet the design goals. |
|
|
Term
|
Definition
Information security involves more than protecting the information itself. |
|
|
Term
|
Definition
MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address. |
|
|
Term
|
Definition
When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____. |
|
|
Term
|
Definition
RC4 is a ____ cipher that accepts keys up to 128 bits in length. |
|
|
Term
|
Definition
In a brute force attack, what key combination would follow 00001? |
|
|
Term
|
Definition
A ____ attack on WEP involves viewing collisions to derive plaintext values. |
|
|
Term
|
Definition
Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard. |
|
|
Term
|
Definition
Which aspect of information security does WEP protect? |
|
|
Term
|
Definition
In a 64-bit packet sent using WEP, how many bits are actually encrypted? |
|
|
Term
|
Definition
While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw. |
|
|
Term
|
Definition
Access ____________________ is intended to guard one of the three CIA characteristics of information, namely the availability of information. |
|
|
Term
|
Definition
In WEP, the CRC generates a(n) ____ based on the contents of the text. |
|
|
Term
|
Definition
A ____ is not malicious but often seeks to expose security flaws. |
|
|
Term
|
Definition
A standard personal computer can easily create over ____ possible password combinations per second. |
|
|
Term
|
Definition
A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device. |
|
|
Term
|
Definition
On wireless networks, ____ attacks are commonly done by attackers setting up a “fake” access point. |
|
|
Term
|
Definition
Which type of attacker typically has a high skill level? |
|
|
Term
|
Definition
What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology? |
|
|
Term
Computer Emergency Response Team Coordination Center (CERT/CC) |
|
Definition
____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University. |
|
|
Term
|
Definition
limit a user’s admission to the access point |
|
|
Term
|
Definition
person who uses his or her advanced computer skills to attack computers but not with a malicious intent |
|
|
Term
|
Definition
key value that is used to encrypt wireless data transmissions when they are sent |
|
|
Term
|
Definition
|
|
Term
|
Definition
person who violates system security with malicious intent |
|
|
Term
|
Definition
attacker floods the radio frequency spectrum with noise |
|
|
Term
|
Definition
unskilled or novice users who break into computer systems with malicious intent |
|
|
Term
|
Definition
series of 1’s and 0’s equal in length to the text plus the ICV |
|
|
Term
|
Definition
person who has been hired to break into a computer and steal information |
|
|
Term
|
Definition
the farthest distance at which the signal can be received by the wireless device |
|
|
Term
|
Definition
frame is sent from one sender to multiple receivers with a single “transmit” operation |
|
|
Term
|
Definition
area in which the signal can be received from the AP |
|
|
Term
|
Definition
frame is sent from one sender to a single receiver |
|
|
Term
|
Definition
used to pick up any packets that are being transmitted by other WLANs in the area and can provide additional information on transmissions |
|
|
Term
|
Definition
scans the radio frequency spectrum and provides a graphical display of the results |
|
|
Term
|
Definition
measurement tool that is specifically designed for conducting a wireless LAN site survey |
|
|
Term
|
Definition
range of coverage for a specific transmission speed |
|
|
Term
|
Definition
number of packets sent and received and the data rates for each |
|
|