Term
|
Definition
A device in ____ mode is part of the piconet but is in a low-power state. |
|
|
Term
|
Definition
can figure out the best route for information to take across the network based on the quality required, meaning a video stream could take a different route to a Webcam that requires much less bandwidth |
|
|
Term
|
Definition
designed for devices in a range of up to 50 kilometers (31 miles) using RF or infrared transmission technology at a variety of speeds |
|
|
Term
|
Definition
industry consortium composed of several major semiconductor vendors that is intended to promote the 802.15.4 standard |
|
|
Term
|
Definition
network designed for hand-held and portable devices at slow to moderate transmission speeds |
|
|
Term
|
Definition
company’s internal infrastructure connection between two or more remote locations |
|
|
Term
Infrared Data Association |
|
Definition
non-profit consortium with over 160 member companies that represent computer and telecommunications hardware, software, components, and adapters |
|
|
Term
|
Definition
wireless facility that connects networks in different parts of a country or of the world |
|
|
Term
|
Definition
group of piconets in which connections exist between different piconets |
|
|
Term
|
Definition
optical, wireless, point-to-point, line-of-sight wireless technology |
|
|
Term
|
Definition
Power consumption is so low for 802.15.4 devices that it is estimated that batteries powering the devices can last up to ____. |
|
|
Term
|
Definition
What type of wireless network is used for portable or stationary devices that are within 107 meters (350 feet) of each other or a centrally located access point? |
|
|
Term
|
Definition
The “last mile connection” refers to an optical, wireless, point-to-point, line-of-sight wireless technology. |
|
|
Term
|
Definition
In a piconet, one device is the ____, and controls all of the wireless traffic. |
|
|
Term
|
Definition
What is the shape of cells in a cellular telephone network? |
|
|
Term
10 millimeters up to 6 meters |
|
Definition
The range for passive RFID tags is ____. |
|
|
Term
|
Definition
The transmission speed of wireless personal area networks is higher than the other types of networks. |
|
|
Term
|
Definition
Although the use of satellites for personal wireless communication is fairly recent, satellites themselves have been used for worldwide communications for over 40 years. |
|
|
Term
|
Definition
Although the use of satellites for personal wireless communication is fairly recent, satellites themselves have been used for worldwide communications for over 40 years. |
|
|
Term
|
Definition
A group of piconets in which connections exist between different piconets is called a(n) ____________________. |
|
|
Term
|
Definition
Free space optics (FSO) transmissions are sent by low-powered ____ beams through the open air. |
|
|
Term
|
Definition
A(n) ____________________ transmission is for communication between one sender and multiple receivers. |
|
|
Term
|
Definition
Current costs to run a fiber optic cable can range as high as $____ per mile. |
|
|
Term
|
Definition
The advantage of ____________________ networking systems is that devices configure themselves and are intelligent. |
|
|
Term
|
Definition
The ZigBee group has drafted standards relating to network configuration, security, and other higher-level features that are not covered by the IEEE 802.15.4 standard. |
|
|
Term
|
Definition
What type of RFID tag operates at 2.45 GHz? |
|
|
Term
geosynchronous earth orbiting |
|
Definition
A ____ satellite remains “fixed” over a given location on the earth and seems to hang motionless in space. |
|
|
Term
|
Definition
____ is the name given to a wireless technology that uses short-range RF transmissions. |
|
|
Term
|
Definition
____ is another name for IEEE 802.15.3a. |
|
|
Term
|
Definition
Problems on the wireless device are more common than problems affecting access points. |
|
|
Term
|
Definition
All access points have a(n) ____ connector that allows them to connect to an Ethernet hub or switch to provide wired network resources to wireless devices. |
|
|
Term
access point is operating normally but is not associated with any wireless devices |
|
Definition
What does a blinking green status indicator LED mean on an AP? |
|
|
Term
|
Definition
The default protocol of older Novell Net-Ware LANs is ____. |
|
|
Term
|
Definition
Dividing a wired network into ____ makes network management easier and decreases the spread of broadcast packets throughout the network. |
|
|
Term
|
Definition
With some wireless networks using Mobile IP, up to ____ AAPs can be designated. |
|
|
Term
|
Definition
The MAC Addr field displays the default MAC address for the access point assigned by the manufacturer and cannot be changed. |
|
|
Term
|
Definition
Frames can be filtered based on the protocol of that frame, such as TCP, or ____. |
|
|
Term
intermittent connectivity problems for wireless connections |
|
Definition
Some computer viruses are known to cause ____. |
|
|
Term
|
Definition
In Mobile IP, what information is advertised on the network? |
|
|
Term
|
Definition
What is the most frequent cause of wireless transmission problems? |
|
|
Term
|
Definition
When a stronger signal from one wireless device drowns out another a(n) ____ problem is occurring. |
|
|
Term
|
Definition
When enabling Ethernet Timeout, the value in the Seconds field is generally set to between 30 and ____. |
|
|
Term
|
Definition
The ____________________ access point uses a subnet map to keep track of the home agent information for all visiting client devices. |
|
|
Term
|
Definition
When an access point is first turned on or when Mobile IP is first enabled on an access point, it obtains its own home agent information through advertising. |
|
|
Term
|
Definition
Filtering can be performed by configuring the access point so that it acts as a type of ____. |
|
|
Term
frequency hopping spread spectrum |
|
Definition
Devices using ____ may cause all-band interference. |
|
|
Term
|
Definition
The Default IP Address and Default IP Subnet Mask fields are used only when ____ is enabled for the network. |
|
|
Term
determine if all devices are experiencing the problem or only a single device |
|
Definition
What is a good first step in diagnosing system throughput issues? |
|
|
Term
|
Definition
If the wireless device is configured for DHCP yet no DHCP server is active, then Windows assigns a(n) ____________________ IP Addressing address that begins with the IP range 169.254.x.x. |
|
|
Term
|
Definition
What information is required for a link budget? |
|
|
Term
|
Definition
When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP. |
|
|
Term
|
Definition
Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception. |
|
|
Term
|
Definition
It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes. |
|
|
Term
|
Definition
Which type of RF loss is caused by the equipment itself, not external objects? |
|
|
Term
|
Definition
____ attenuators are the only type permitted by the FCC for WLAN systems. |
|
|
Term
|
Definition
Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation. |
|
|
Term
|
Definition
The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization’s assets. |
|
|
Term
|
Definition
Information security weaknesses can never be entirely eliminated. |
|
|
Term
|
Definition
What is another name for propagation loss? |
|
|
Term
|
Definition
A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground. |
|
|
Term
|
Definition
A wireless network is a static system. |
|
|
Term
|
Definition
What technique(s) is/are most effective for defeating social engineering attacks? |
|
|
Term
|
Definition
A(n) ____________________ antenna is typically used in outdoor areas. They are designed to be used in installations where aesthetics and high performance are key factors. |
|
|
Term
|
Definition
A ____ antenna is most typically used on a WLAN. |
|
|
Term
|
Definition
For a proper WLAN performance, the link budget must be ____ dB. |
|
|
Term
|
Definition
software that is embedded into hardware to control the device |
|
|
Term
|
Definition
device that has a single input connector and multiple output connectors |
|
|
Term
|
Definition
part of SNMP that monitors network traffic and stores that information in its management information base |
|
|
Term
|
Definition
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link |
|
|
Term
|
Definition
device that decreases the RF signal |
|
|
Term
|
Definition
device that decreases the RF signal |
|
|
Term
|
Definition
device that decreases the RF signal |
|
|
Term
|
Definition
SNMP-based tool used to monitor LANs that are connected through a wide area network |
|
|
Term
|
Definition
attempting to readjust the settings of the AP after a firmware upgrade |
|
|
Term
|
Definition
decreases interference by attenuating unwanted sources of interference |
|
|
Term
effective receiving sensibility |
|
Definition
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm) |
|
|
Term
a team with diverse backgrounds |
|
Definition
When conducting a security audit, ____ should determine vulnerabilities. |
|
|
Term
|
Definition
____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it. |
|
|
Term
shared key authentication |
|
Definition
What is the first step in implementing an interim security model? |
|
|
Term
|
Definition
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified. |
|
|
Term
|
Definition
How long is the per-packet key used in TKIP? |
|
|
Term
|
Definition
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in. |
|
|
Term
encryption and authentication |
|
Definition
The 802.11i standard addresses both ____. |
|
|
Term
|
Definition
A ____ VPN is a user-to-LAN connection used by remote users. |
|
|
Term
|
Definition
The ____ wireless security standard provides a low level of security. |
|
|
Term
|
Definition
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option. |
|
|
Term
|
Definition
In WPA, ________________________________________ encryption replaces WEP’s small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change. |
|
|
Term
|
Definition
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials |
|
|
Term
|
Definition
|
|
Term
|
Definition
designed to prevent an attacker from capturing, altering, and resending data packets |
|
|
Term
|
Definition
solves the weak IV problem by rotating the keys frequently |
|
|
Term
|
Definition
encryption protocol in the 802.11i standard |
|
|
Term
pre-shared key authentication |
|
Definition
uses a passphrase that is manually entered to generate the encryption key |
|
|
Term
|
Definition
traffic sent to all users on the network |
|
|
Term
Advanced Encryption Standard |
|
Definition
performs three steps on every block (128 bits) of plaintext |
|
|
Term
|
Definition
wireless device that requires secure network access |
|
|
Term
|
Definition
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements. |
|
|
Term
|
Definition
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology. |
|
|
Term
|
Definition
____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users. |
|
|
Term
|
Definition
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special “scan” mode, monitor the airwaves to detect signals from rogue access points. |
|
|
Term
|
Definition
What security technology was most recently introduced? |
|
|
Term
|
Definition
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch. |
|
|
Term
|
Definition
The block cipher used in 802.11i is the Data Encryption Standard (DES). |
|
|
Term
|
Definition
What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it? |
|
|
Term
|
Definition
____ replaces CRC in WPA. |
|
|
Term
|
Definition
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network. |
|
|