Term
| Client systems communicate with a wireless access point using a ___ ___ adapter. |
|
Definition
|
|
Term
| A wireless access point is both a ___ and ___ of wireless LAN (WLAN) radio signals. |
|
Definition
transmitter receiver (transceiver) |
|
|
Term
| Access points use the ___ ___ network mode to provide a connection between a WLAN and a wired Ethernet LAN. |
|
Definition
|
|
Term
| Access points typically have several ___s which can be used to expand the network to support additional clients. |
|
Definition
|
|
Term
| An Access Point can operate as a ___, connecting a standard wired network to wireless devices, or as a ___, passing data transmissions from one access point to another. |
|
Definition
|
|
Term
| In the ___ mode, the AP receives transmissions from wireless devices and transmits those signals to the network. |
|
Definition
|
|
Term
| The ___ ___ ___ is a network name needed to connect to a wireless AP. |
|
Definition
| Service Set Identifier (SSID) |
|
|
Term
| ___ ___ ___ is a wireless network that uses a single AP with one or more wireless clients connecting to the AP. |
|
Definition
|
|
Term
| The BSS is an example of the ___ wireless topology. |
|
Definition
|
|
Term
___ ___ ___ is two or more connected BSSs that use multiple APs. |
|
Definition
| Extended Service Set (ESS) |
|
|
Term
| The ___ ___ ___ is used to create WLANs or larger wireless networks and is a collection of APs and clients. |
|
Definition
| Extended Service Set (ESS) |
|
|
Term
| ___ ___ ___ systems enables clients to roam between areas and maintain the wireless connection without having to reconfigure between BSSs. |
|
Definition
| Extended Service Set (ESS) |
|
|
Term
| ___ is the network name used with an ESS wireless network design. |
|
Definition
|
|
Term
True or False? With an ESS, all APs must use the same ESSID. |
|
Definition
|
|
Term
| The __ __ __ __ is the MAC address of the Basic Service Set (BSS) AP |
|
Definition
| Basic Service Set Identifier (BSSID) |
|
|
Term
| The ___ ___ ___ is the coverage area of an AP. |
|
Definition
|
|
Term
| An antenna's ___ value is the difference between the 0dBi isotropic and the antenna's power. |
|
Definition
|
|
Term
| A higher gain value means stronger send and receive signals. The rule of thumb is that every __dB of gain added doubles an antenna's effective power output. |
|
Definition
|
|
Term
| An ___ antenna is designed to provide a 360-degree dispersed wave pattern. This type of antenna is used when coverage in all directions from the antenna is required. |
|
Definition
|
|
Term
| A ___ antenna is designed to focus the signal in a particular direction. |
|
Definition
|
|
Term
True or False? Omnidirectional antennas provide wide coverage but weaker signal strength in any one direction than a directional antenna. |
|
Definition
|
|
Term
| One ___ is equal to one cycle per second. |
|
Definition
|
|
Term
| The 802.11__ standard specifies radio frequency ranges between 5.15 and 5.875GHz. |
|
Definition
|
|
Term
| 802.11__ and 802.11__ standards operate in the 2.4 to 2.497GHz range. |
|
Definition
|
|
Term
| 802.11a has a wider frequency band that enables more ___s and therefore more data throughput. |
|
Definition
|
|
Term
| 802.11a supports up to __ nonoverlapping channels. 802.11b/g standards support up to __ nonoverlapping channels. |
|
Definition
|
|
Term
| Most wireless device manufacturers set their default channel to one of the ___ channels to avoid transmission conflicts. |
|
Definition
|
|
Term
| In Windows, you use the ___ command to see the status of IP configuration. |
|
Definition
|
|
Term
| In Linux, you use the ___ command to see the status of IP configuration. |
|
Definition
|
|
Term
| Linux uses the ___ command to view additional IP info such as the link quality, AP MAC address, data rate, and encryption keys.. |
|
Definition
|
|
Term
| 802.11__ added multiple-input multiple-output antennas (MIMO) to produce a huge increase in the data rate. |
|
Definition
|
|
Term
| Wireless channels __, __ and __ do not overlap. |
|
Definition
|
|
Term
| ___ ___ refers to the theoretical maximum of a wireless standard, such as 100Mbps. |
|
Definition
|
|
Term
| ___ refers to the actual speeds achieved on a wireless network after all implementation and interference factors. |
|
Definition
|
|
Term
| In practical application, wireless transmission speeds are about __% or less of the data rate. |
|
Definition
|
|
Term
| Wireless clients automatically search for the ___ ___ frame and attempt to establish a wireless connection to the access point. |
|
Definition
| beacon management frame (beacon) |
|
|
Term
| The beacon frame is sent by the access point in an ___ network design. Client stations send beacons only if connected in an ___ ___ network design. |
|
Definition
|
|
Term
| The two methods of AP discovery are ___ scanning and ___ scanning. |
|
Definition
|
|
Term
| With ___ scanning, the client system listens for beacon frames to discover an AP. After it is detected, the beacon frame provides the information necessary for the system to access the AP. |
|
Definition
|
|
Term
| With ___ scanning, the client station transmits a management frame known as a probe request. All APs with the same SSID reply with a probe response, which enables the client to access the system. |
|
Definition
|
|
Term
With ___-spectrum, data does not travel straight through a single RF band; instead, data signals either alternate between carrier frequencies or constantly change their data pattern. |
|
Definition
|
|
Term
| With a ___ transmission, data travels through a single RF band. |
|
Definition
|
|
Term
| ___-___ signal strategies use more bandwidth than narrowband but the trade-off is a data signal that is clearer and easier to detect. |
|
Definition
|
|
Term
The two types of spread-spectrum radio are ___ ___ and ___ ___. |
|
Definition
frequency hopping direct sequence |
|
|
Term
| __-__ __-__ technology requires the use of narrowband signals that change frequencies in a predictable pattern. |
|
Definition
| Frequency-Hopping Spread-Spectrum (FHSS) |
|
|
Term
| Data signals using __-__ __-__ technology have a strong resistance to interference and environmental factors, which works well for installations covering large geographic areas and where using directional antennas is not possible. |
|
Definition
| Frequency-Hopping Spread-Spectrum (FHSS) |
|
|
Term
| With __-__ Spread-Spectrum, the signal is spread over a full transmission frequency spectrum. |
|
Definition
| Direct-Sequence Spread-Spectrum (DSSS) |
|
|
Term
| With DSSS transmissions, for every bit of data sent a redundant bit pattern is also sent. This 32-bit pattern is called a ___. |
|
Definition
|
|
Term
| __-__ __-__ transmissions minimize the effects of interference and background noise. |
|
Definition
| Direct-Sequence Spread-Spectrum (DSSS) |
|
|
Term
| DSSS provides better ___ and signal delivery than FHSS, but it is a sensitive technology that is affected by many ___ factors. |
|
Definition
|
|
Term
| ___ ___ ___ ___ transmissions transfer large amounts of data over 52 separate, evenly spaced frequencies. |
|
Definition
| Orthogonal Frequency Division Multiplexing (OFDM) |
|
|
Term
| By splitting the signal and transferring it over different frequencies, OFDM reduces the amount of ___ interference. |
|
Definition
|
|
Term
| A ___ infrared system provides a limited range of about 3 feet and typically is used for personal area networks. |
|
Definition
|
|
Term
| ___ infrared systems do not require line of sight, but usable distance is limited to room distances. |
|
Definition
|
|
Term
| Infrared provides a secure, low-cost, convenient alternative to ___ technology. |
|
Definition
|
|
Term
| In an ___ wireless network design, the network has two key parts: the wireless client, also known as the station (STA), and the AP. The AP acts as a bridge between the STA and the wired network. |
|
Definition
|
|
Term
| The ___ process occurs when a wireless adapter is turned on and begins scanning the wireless frequencies for wireless APs or, if using ad hoc mode, other wireless devices. |
|
Definition
|
|
Term
If the wireless signal drops below an acceptable level, the wireless adapter initiates another scan, looking for an AP with stronger signals. This is known as ___. |
|
Definition
|
|
Term
| When the association process is complete, the ___ process begins. |
|
Definition
|
|
Term
| On many APs, authentication can be set to either ___ key or ___ key. |
|
Definition
|
|
Term
| ___ authentication enables access with only the SSID and/or the correct WEP key for the AP. |
|
Definition
|
|
Term
| When set to ___ ___ mode, the client must meet security requirements before communication with the AP can occur. |
|
Definition
|
|
Term
| When association and authentication are complete, the system is said to have achieved established __-level communication and Ethernet networking takes over. |
|
Definition
|
|
Term
| ___ ___ filtering can be used to limit access to specified hosts. |
|
Definition
|
|
Term
| ___-___ is the simplest method of authentication because it does not perform any type of client verification. It is a weak form of authentication because it requires no proof of identity. |
|
Definition
|
|
Term
| ___-___ authentication requires that a WEP key be configured on both the client system and the access point. This makes authentication mandatory, so it is more secure for wireless transmission. |
|
Definition
|
|
Term
| ___-___ is a form of encryption in which keys are automatically changed and authenticated between devices after a specified period of time, or after a specified number of packets have been transmitted. |
|
Definition
| WPA-psk (Wi-Fi Protected Access with Pre-Shared Key) |
|
|
Term
| Multiple broadcast messages are known as ___ or ___ traffic. |
|
Definition
|
|
Term
| __ __ __ __ ensures that when the multicast or broadcast traffic is sent, all systems are awake to hear the message. |
|
Definition
| Delivery Traffic Indication Message (DTIM) |
|
|
Term
| The DTIM setting specifies how often the DTIM is sent within the ___ frame. |
|
Definition
|
|
Term
| 802.11a, b, g and n all use the ___ protocol and the ___ access method. |
|
Definition
|
|
Term
| All 802.11 standards can use either a ___ or ___ ___ network design, and each can use the same ___ protocols. |
|
Definition
infrastructure ad hoc security |
|
|
Term
___ specifies speeds of up to 54Mbps in the 5GHz band. |
|
Definition
|
|
Term
True or False? 802.11a is incompatible with 802.11b and 802.11g. |
|
Definition
|
|
Term
___ specifies speeds of up to 11Mbps in the 2.4GHz band. |
|
Definition
|
|
Term
___ specifies speeds of up to 54Mbps in the 2.4GHz band. |
|
Definition
|
|
Term
True or False? 802.11g is compatible with 802.11b |
|
Definition
|
|
Term
___ specifies speeds of up to 100Mbps in either the 2.4GHz or 5GHz band. |
|
Definition
|
|
Term
| In 802.11n, ___ is used to increase the range and speed of wireless networking. |
|
Definition
|
|
Term
| ___ combines multiple signals for transmission over a single line or medium. |
|
Definition
|
|
Term
| 802.11b and 802.11g use a single channel to send and receive information. 802.11n uses ___ ___ to use two channels at the same time. |
|
Definition
|
|
Term
| In wireless networking a single channel is ___ MHz wide. When two channels are bonded, they have a total width of __MHz. |
|
Definition
|
|
Term
| ___ ___ Protocol provides security by encrypting data from both sending and receiving devices. |
|
Definition
| Wired Equivalency Protocol |
|
|
Term
| ___ WEP uses the same security key on an ongoing basis. ___ WEP changes security keys periodically, making it more secure. |
|
Definition
|
|
Term
| WEP uses ___ ___ Protocol to regulate access to a wireless network based on a computer’s MAC address, which is relatively simple to steal. |
|
Definition
| Extensible Authentication Protocol (EAP) |
|
|
Term
| WPA uses a ___ ___ ___ protocol that scrambles encryption keys using a hashing algorithm. |
|
Definition
| Temporal Key Integrity Protocol (TKIP) |
|
|
Term
| Known as ___, the 802.11i standard provides security enhancements to the wireless standard with particular focus on authentication. |
|
Definition
|
|
Term
True or False? WPA is compatible with older wireless cards; WPA2 is not. |
|
Definition
|
|
Term
| Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) uses 128-bit AES encryption with a 48-bit initialization vector to increase the difficulty in ___ and minimize the risk of ___. |
|
Definition
|
|
Term
| ___ uses TKIP, whereas ___ uses CCMP. |
|
Definition
|
|
Term
| ___ ___ security, also known as 802.1X, specifies port-based network access control. |
|
Definition
|
|
Term
| Used for both wired and wireless networks, ___ ___ uses the physical characteristics of a switched local area network (LAN) infrastructure to authenticate devices attached to a LAN port and to prevent access to that port in cases where authentication fails. |
|
Definition
|
|
Term
| In the 802.1X framework, the ___ is the system or node requesting access and authentication to a network resource |
|
Definition
|
|
Term
| In the 802.1X framework, the ___ is the control mechanism that allows or denies traffic that wants to pass through a port |
|
Definition
|
|
Term
| In the 802.1X framework, the ___ ___ validates the credentials of the supplicant that is trying to access the network or resource |
|
Definition
|
|
Term
| With port-based network access control, a LAN port adopts one of two roles: ___ or ___. |
|
Definition
|
|
Term
| A ___ server checks the supplicant’s credentials on behalf of the authenticator. |
|
Definition
|
|
Term
| The authenticator’s ___-based network access control defines two logical access points to the LAN through one physical LAN port. |
|
Definition
|
|
Term
| In the 802.1X framework, the first logical access point is the ___ed port, which enables data exchange between the authenticator and other computers on the LAN regardless of the computer's authorization state. |
|
Definition
|
|
Term
| In the 802.1X framework, the second logical access point is the ___ed port, which enables data exchange between an authenticated LAN user and the authenticator. |
|
Definition
|
|
Term
| In a wireless network environment, the ___ typically is a network host. |
|
Definition
|
|
Term
| In a wireless network environment, the ___ could be the wireless network switch or AP. |
|
Definition
|
|
Term
True or False? WPA Enterprise is synonymous with 802.1X |
|
Definition
|
|
Term
True or False? By default, wireless devices are configured to use the strongest, fastest signal. |
|
Definition
|
|
Term
| Connectivity problems among wireless devices can be solved by using a lower ___ rate in a ___ mode to achieve a more stable connection. |
|
Definition
|
|
Term
True or False? The higher the transfer rate, the longer the connection distance. |
|
Definition
False
The higher the transfer rate, the SHORTER the connection distance. |
|
|
Term
| If connections are inconsistent, try changing the channel to another, ___ channel. |
|
Definition
|
|
Term
| The most severe wireless obstacles indoors are ___, ___ and ___. |
|
Definition
|
|