Shared Flashcard Set

Details

Wireless LANs Chapters 9-12
Wireless LANs Chapters 9-12
106
Computer Science
Undergraduate 2
05/01/2011

Additional Computer Science Flashcards

 


 

Cards

Term
park/hold
Definition
A device in ____ mode is part of the piconet but is in a low-power state.
Term
mesh wireless network
Definition
can figure out the best route for information to take across the network based on the quality required, meaning a video stream could take a different route to a Webcam that requires much less bandwidth
Term
WMAN
Definition
designed for devices in a range of up to 50 kilometers (31 miles) using RF or infrared transmission technology at a variety of speeds
Term
ZigBee Alliance
Definition
industry consortium composed of several major semiconductor vendors that is intended to promote the 802.15.4 standard
Term
WPAN
Definition
network designed for hand-held and portable devices at slow to moderate transmission speeds
Term
backhaul connection
Definition
company’s internal infrastructure connection between two or more remote locations
Term
Infrared Data Association
Definition
non-profit consortium with over 160 member companies that represent computer and telecommunications hardware, software, components, and adapters
Term
WWAN
Definition
wireless facility that connects networks in different parts of a country or of the world
Term
scatternet
Definition
group of piconets in which connections exist between different piconets
Term
free space optics
Definition
optical, wireless, point-to-point, line-of-sight wireless technology
Term
5 years
Definition
Power consumption is so low for 802.15.4 devices that it is estimated that batteries powering the devices can last up to ____.
Term
WLAN
Definition
What type of wireless network is used for portable or stationary devices that are within 107 meters (350 feet) of each other or a centrally located access point?
Term
False
Definition
The “last mile connection” refers to an optical, wireless, point-to-point, line-of-sight wireless technology.
Term
master
Definition
In a piconet, one device is the ____, and controls all of the wireless traffic.
Term
hexagon
Definition
What is the shape of cells in a cellular telephone network?
Term
10 millimeters up to 6 meters
Definition
The range for passive RFID tags is ____.
Term
False
Definition
The transmission speed of wireless personal area networks is higher than the other types of networks.
Term
True
Definition
Although the use of satellites for personal wireless communication is fairly recent, satellites themselves have been used for worldwide communications for over 40 years.
Term
True
Definition
Although the use of satellites for personal wireless communication is fairly recent, satellites themselves have been used for worldwide communications for over 40 years.
Term
scatternet
Definition
A group of piconets in which connections exist between different piconets is called a(n) ____________________.
Term
infrared
Definition
Free space optics (FSO) transmissions are sent by low-powered ____ beams through the open air.
Term
point-to-multipoint
Definition
A(n) ____________________ transmission is for communication between one sender and multiple receivers.
Term
200,000
Definition
Current costs to run a fiber optic cable can range as high as $____ per mile.
Term
mesh
Definition
The advantage of ____________________ networking systems is that devices configure themselves and are intelligent.
Term
True
Definition
The ZigBee group has drafted standards relating to network configuration, security, and other higher-level features that are not covered by the IEEE 802.15.4 standard.
Term
Microwave
Definition
What type of RFID tag operates at 2.45 GHz?
Term
geosynchronous earth orbiting
Definition
A ____ satellite remains “fixed” over a given location on the earth and seems to hang motionless in space.
Term
Bluetooth
Definition
____ is the name given to a wireless technology that uses short-range RF transmissions.
Term
Ultrawideband
Definition
____ is another name for IEEE 802.15.3a.
Term
False
Definition
Problems on the wireless device are more common than problems affecting access points.
Term
RJ-45
Definition
All access points have a(n) ____ connector that allows them to connect to an Ethernet hub or switch to provide wired network resources to wireless devices.
Term
access point is operating normally but is not associated with any wireless devices
Definition
What does a blinking green status indicator LED mean on an AP?
Term
IPX
Definition
The default protocol of older Novell Net-Ware LANs is ____.
Term
subnets
Definition
Dividing a wired network into ____ makes network management easier and decreases the spread of broadcast packets throughout the network.
Term
three
Definition
With some wireless networks using Mobile IP, up to ____ AAPs can be designated.
Term
True
Definition
The MAC Addr field displays the default MAC address for the access point assigned by the manufacturer and cannot be changed.
Term
UDP
Definition
Frames can be filtered based on the protocol of that frame, such as TCP, or ____.
Term
intermittent connectivity problems for wireless connections
Definition
Some computer viruses are known to cause ____.
Term
All of the above
Definition
In Mobile IP, what information is advertised on the network?
Term
RF issues
Definition
What is the most frequent cause of wireless transmission problems?
Term
near/far transmission
Definition
When a stronger signal from one wireless device drowns out another a(n) ____ problem is occurring.
Term
255
Definition
When enabling Ethernet Timeout, the value in the Seconds field is generally set to between 30 and ____.
Term
authoritative
Definition
The ____________________ access point uses a subnet map to keep track of the home agent information for all visiting client devices.
Term
True
Definition
When an access point is first turned on or when Mobile IP is first enabled on an access point, it obtains its own home agent information through advertising.
Term
firewall
Definition
Filtering can be performed by configuring the access point so that it acts as a type of ____.
Term
frequency hopping spread spectrum
Definition
Devices using ____ may cause all-band interference.
Term
DHCP
Definition
The Default IP Address and Default IP Subnet Mask fields are used only when ____ is enabled for the network.
Term
determine if all devices are experiencing the problem or only a single device
Definition
What is a good first step in diagnosing system throughput issues?
Term
Automatic Private
Definition
If the wireless device is configured for DHCP yet no DHCP server is active, then Windows assigns a(n) ____________________ IP Addressing address that begins with the IP range 169.254.x.x.
Term
All of the above
Definition
What information is required for a link budget?
Term
multicast
Definition
When updating firmware in an enterprise-level access point, the Receiving AP must be able to hear the IP ____ issued by the Distribution AP.
Term
True
Definition
Antenna adjustment may require the existing antennas to be reoriented or placed on a pole or mast for better transmission and reception.
Term
manual
Definition
It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.
Term
Voltage
Definition
Which type of RF loss is caused by the equipment itself, not external objects?
Term
Fixed-loss
Definition
____ attenuators are the only type permitted by the FCC for WLAN systems.
Term
azimuth
Definition
Most vendors illustrate their radiation patterns by splitting the three-dimensional donut into two perpendicular planes called ____ and elevation.
Term
risk assessment
Definition
The first step in the security policy cycle is to perform a(n) ____________________, which attempts to determine the nature of the risks to the organization’s assets.
Term
True
Definition
Information security weaknesses can never be entirely eliminated.
Term
free space loss
Definition
What is another name for propagation loss?
Term
lightning arrestor
Definition
A ____ limits the amplitude and disturbing interference voltages by channeling them to the ground.
Term
False
Definition
A wireless network is a static system.
Term
education and policies
Definition
What technique(s) is/are most effective for defeating social engineering attacks?
Term
EEPROM
Definition
A(n) ____________________ antenna is typically used in outdoor areas. They are designed to be used in installations where aesthetics and high performance are key factors.
Term
rod
Definition
A ____ antenna is most typically used on a WLAN.
Term
greater than zero
Definition
For a proper WLAN performance, the link budget must be ____ dB.
Term
firmware
Definition
software that is embedded into hardware to control the device
Term
splitter
Definition
device that has a single input connector and multiple output connectors
Term
software agent
Definition
part of SNMP that monitors network traffic and stores that information in its management information base
Term
link budget
Definition
rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link
Term
attenuator
Definition
device that decreases the RF signal
Term
attenuator
Definition
device that decreases the RF signal
Term
attenuator
Definition
device that decreases the RF signal
Term
Remote Monitoring
Definition
SNMP-based tool used to monitor LANs that are connected through a wide area network
Term
RF site tuning
Definition
attempting to readjust the settings of the AP after a firmware upgrade
Term
beam steering
Definition
decreases interference by attenuating unwanted sources of interference
Term
effective receiving sensibility
Definition
antenna gain (dBi) less cable loss (dB) at the receiver and receiver sensitivity (dBm)
Term
a team with diverse backgrounds
Definition
When conducting a security audit, ____ should determine vulnerabilities.
Term
Physical
Definition
____ security protects the equipment and infrastructure itself, and has one primary goal: to prevent unauthorized users from reaching the equipment in order to use, steal, or vandalize it.
Term
shared key authentication
Definition
What is the first step in implementing an interim security model?
Term
port security
Definition
Within the IEEE 802.1x standard, ____ ensures that a device (wired or wireless) that requests access to the network is prevented from receiving any traffic until its identity can be verified.
Term
128-bits
Definition
How long is the per-packet key used in TKIP?
Term
unicast
Definition
In dynamic WEP, the ____ key is changed every time the user roams to a new AP or logs out and logs back in.
Term
encryption and authentication
Definition
The 802.11i standard addresses both ____.
Term
remote-access
Definition
A ____ VPN is a user-to-LAN connection used by remote users.
Term
All of the above
Definition
The ____ wireless security standard provides a low level of security.
Term
hexadecimal
Definition
When implementing an interim security model, most vendors have the option of a 128-bit WEP key, which can be created by entering 16 ____ characters. This provides the most secure option.
Term
TKIP
Definition
In WPA, ________________________________________ encryption replaces WEP’s small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
Term
key caching
Definition
stores information from a device on the network so if a user roams away from an AP and later returns, she does not need to re-enter all of the credentials
Term
802.11i
Definition
robust security network
Term
Message Integrity Check
Definition
designed to prevent an attacker from capturing, altering, and resending data packets
Term
dynamic WEP
Definition
solves the weak IV problem by rotating the keys frequently
Term
AES-CCMP
Definition
encryption protocol in the 802.11i standard
Term
pre-shared key authentication
Definition
uses a passphrase that is manually entered to generate the encryption key
Term
broadcast
Definition
traffic sent to all users on the network
Term
Advanced Encryption Standard
Definition
performs three steps on every block (128 bits) of plaintext
Term
supplicant
Definition
wireless device that requires secure network access
Term
True
Definition
WEP2 attempted to overcome the limitations of WEP by adding two new security enhancements.
Term
True
Definition
WPA authentication can be accomplished by using either IEEE 802.1x or pre-shared key (PSK) technology.
Term
Kerberos
Definition
____________________ was developed by the Massachusetts Institute of Technology (MIT) and used to verify the identity of network users.
Term
wireless sensors
Definition
At the heart of a WIDS are ____; these devices, which can be either separate hardware devices or a standard access point operating in a special “scan” mode, monitor the airwaves to detect signals from rogue access points.
Term
WPA2
Definition
What security technology was most recently introduced?
Term
gateways
Definition
Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
Term
False
Definition
The block cipher used in 802.11i is the Data Encryption Standard (DES).
Term
pre-authentication
Definition
What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?
Term
MIC
Definition
____ replaces CRC in WPA.
Term
True
Definition
A virtual private network (VPN) uses a public, unsecured network as if it were a private, secured network.
Supporting users have an ad free experience!