Term
|
Definition
| Why is CSMA/CD unsuitable for wireless networks? |
|
|
Term
|
Definition
| ____ IP provides mechanism within the TCP/IP protocol to support mobile computing by using a home agent as a forwarding mechanism to keep track of where the mobile computer is located. |
|
|
Term
|
Definition
| The _____ field appears first in a management frame. |
|
|
Term
|
Definition
| ____ involves dividing the data to be transmitted from one large frame into several smaller ones. |
|
|
Term
|
Definition
| Which of the following describes a wireless device switching from one AP to another? |
|
|
Term
|
Definition
| When a laptop, either in ad hoc or infrastructure mode, is connected to a standard alternating current (AC) plug for power it is in _____ mode and remains in communication with the AP or other wireless devices. |
|
|
Term
|
Definition
| What is the minimum number of BSS networks required to form an ESS? |
|
|
Term
|
Definition
| The ____ draft defines a superset of features that is intended to provide QoS over WLANs. |
|
|
Term
|
Definition
| With MobileIP, the ____ assigns the mobile computer a new (but temporary) IP number. |
|
|
Term
|
Definition
| A home agent is a forwarding mechanism that keeps track of where the mobile computer is located. |
|
|
Term
|
Definition
| When an ESS is installed it is desirable to configure the areas of coverage much like cells in a cellular telephone system. |
|
|
Term
| the one with the strongest signal strength |
|
Definition
| On ESS networks that have multiple access points, the wireless device might actually receive beacon frames from several APs. Which AP would a wireless device generally choose in this case? |
|
|
Term
| wireless device sends an authentication frame to the AP |
|
Definition
| What is the first step in shared key authentication? |
|
|
Term
|
Definition
| All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection. |
|
|
Term
| a group of wireless devices that is served by a single access point |
|
Definition
|
|
Term
|
Definition
| A wireless device sends an authentication frame to the AP. The AP sends back an authentication frame that contains a block of text known as the ____________________. |
|
|
Term
|
Definition
| The ____ field appears last in a data frame. |
|
|
Term
|
Definition
| The RTS/CTS protocol is especially taxing when ____ data packets are being transmitted. |
|
|
Term
|
Definition
| What is the default authentication method according to the 802.11 standard? |
|
|
Term
|
Definition
| Intel recommends that once the ROI model is complete, larger organizations should return to step ____. |
|
|
Term
|
Definition
| Only in areas where low bandwidth is acceptable or an ad hoc wireless network will be used should ____ networks be considered. |
|
|
Term
|
Definition
| Several vendors are working on comprehensive network management solutions that integrate wireless networks into the same deployment, operations, and management as a wired network. |
|
|
Term
|
Definition
| ____________________ benefits are benefits that can be easily measured or quantified. |
|
|
Term
|
Definition
| In a 802.11b network, how many power users should be associated with one access point? |
|
|
Term
|
Definition
| Wireless ____________________ provide a single mechanism for managing and monitoring the wireless network. |
|
|
Term
|
Definition
| Two adjacent access points that use the same ____ can cause interference and lost frames. |
|
|
Term
|
Definition
| Early adopters of wireless LANs were sometimes called “racehorses”. |
|
|
Term
|
Definition
| ____ is one of the most effective strategies for providing support for a new wireless network. |
|
|
Term
|
Definition
| What is the second step in the wireless LAN model developed by Intel? |
|
|
Term
|
Definition
| Which of the following should be included when documenting current network setup? |
|
|
Term
|
Definition
| A(n) ____ provides wireless LAN service, for free or for a fee, from a variety of public areas, including coffee shops, public libraries, and airport lounges. |
|
|
Term
|
Definition
| What should you do when electrical alternating current power is not available near the AP location? |
|
|
Term
|
Definition
| ____ should be considered when calculating ROI. |
|
|
Term
| personal networked computer |
|
Definition
| What is the single most important tool in any business? |
|
|
Term
|
Definition
| According to NOP-World Technology, ____ percent of end users said that a WLAN improves their quality of life by increasing flexibility and productivity, and saving time. |
|
|
Term
|
Definition
| According to a study conducted by NOP World–Technology, wireless LANs enable users to be connected to network resources ____ additional hours per day. |
|
|
Term
|
Definition
| Which channels in IEEE 802.11b and 802.11g networks do not overlap? |
|
|
Term
|
Definition
| ____ is considered a hard benefit. |
|
|
Term
| note the objects and layout of the room |
|
Definition
| What is the first step in collecting RF information? |
|
|
Term
|
Definition
| The industry-standard form for site survey documentation is IEEE 802.11D. |
|
|
Term
| to ensure that the new or expanded wireless LAN will “dovetail” into what is already in place |
|
Definition
| Why is it important to document existing wired and wireless networks? |
|
|
Term
|
Definition
| What provides the greatest source of RF interference? |
|
|
Term
|
Definition
| The term ____ describes the rate of transmission falling as the device moves farther from the AP. |
|
|
Term
|
Definition
| Users need higher data rates for time-bound transmissions, such as audio and video and therefore need higher ____________________. |
|
|
Term
|
Definition
| Which network requires some sort of gateway or interface to be compatible with IEEE 802.11 WLANs? |
|
|
Term
| prior to installing a WLAN |
|
Definition
| When is the best time to perform a site survey? |
|
|
Term
|
Definition
| A drawback of spectrum analyzers is that the information is displayed in graphical form and not as raw data. |
|
|
Term
|
Definition
| The ____ setting of a site survey analyzer specifies the AP that will be involved in the test. |
|
|
Term
|
Definition
| What is the best way to gather site-specific documentation? |
|
|
Term
|
Definition
| In a site survey analyzer, vendors use an algorithm or a lookup table to convert ____ values to dBm, mW, or signal strength percentage. |
|
|
Term
| distance and objects in path |
|
Definition
| What affects transmission range? |
|
|
Term
|
Definition
| How are business requirements for a WLAN obtained? |
|
|
Term
|
Definition
| The coverage ____________________ is the area in which the signal can be received from the AP. |
|
|
Term
|
Definition
| The transmission ____________________ is the farthest distance at which the signal can be received by the wireless device. |
|
|
Term
|
Definition
| You would use ____ in documenting a site survey. |
|
|
Term
|
Definition
| The first step in collecting RF information is to position the access point in what may appear to be the most logical location. |
|
|
Term
|
Definition
| It is important to evaluate the placement of the access points and antennas throughout the proposed site in order to meet the design goals. |
|
|
Term
|
Definition
| Information security involves more than protecting the information itself. |
|
|
Term
|
Definition
| MAC address filtering is vulnerable because there are programs available that allow users to ____ a MAC address. |
|
|
Term
|
Definition
| When the recipient receives the encrypted text, it must be decrypted with the cipher and the key to produce the original ____. |
|
|
Term
|
Definition
| RC4 is a ____ cipher that accepts keys up to 128 bits in length. |
|
|
Term
|
Definition
| In a brute force attack, what key combination would follow 00001? |
|
|
Term
|
Definition
| A ____ attack on WEP involves viewing collisions to derive plaintext values. |
|
|
Term
|
Definition
| Open system authentication and shared key authentication are the only two types of wireless authentication available under the 802.11 standard. |
|
|
Term
|
Definition
| Which aspect of information security does WEP protect? |
|
|
Term
|
Definition
| In a 64-bit packet sent using WEP, how many bits are actually encrypted? |
|
|
Term
|
Definition
| While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw. |
|
|
Term
|
Definition
| Access ____________________ is intended to guard one of the three CIA characteristics of information, namely the availability of information. |
|
|
Term
|
Definition
| In WEP, the CRC generates a(n) ____ based on the contents of the text. |
|
|
Term
|
Definition
| A ____ is not malicious but often seeks to expose security flaws. |
|
|
Term
|
Definition
| A standard personal computer can easily create over ____ possible password combinations per second. |
|
|
Term
|
Definition
| A wireless DoS attack may involve an attacker sending a series of ____ frames to a wireless device. |
|
|
Term
|
Definition
| On wireless networks, ____ attacks are commonly done by attackers setting up a “fake” access point. |
|
|
Term
|
Definition
| Which type of attacker typically has a high skill level? |
|
|
Term
|
Definition
| What disadvantage of wireless networks provides the biggest stumbling block to the adoption of wireless technology? |
|
|
Term
| Computer Emergency Response Team Coordination Center (CERT/CC) |
|
Definition
| ____ was initially founded by the U.S. Department of Defense and is now part of the Software Engineering Institute at Carnegie Mellon University. |
|
|
Term
|
Definition
| limit a user’s admission to the access point |
|
|
Term
|
Definition
| person who uses his or her advanced computer skills to attack computers but not with a malicious intent |
|
|
Term
|
Definition
| key value that is used to encrypt wireless data transmissions when they are sent |
|
|
Term
|
Definition
|
|
Term
|
Definition
| person who violates system security with malicious intent |
|
|
Term
|
Definition
| attacker floods the radio frequency spectrum with noise |
|
|
Term
|
Definition
| unskilled or novice users who break into computer systems with malicious intent |
|
|
Term
|
Definition
| series of 1’s and 0’s equal in length to the text plus the ICV |
|
|
Term
|
Definition
| person who has been hired to break into a computer and steal information |
|
|
Term
|
Definition
| the farthest distance at which the signal can be received by the wireless device |
|
|
Term
|
Definition
| frame is sent from one sender to multiple receivers with a single “transmit” operation |
|
|
Term
|
Definition
| area in which the signal can be received from the AP |
|
|
Term
|
Definition
| frame is sent from one sender to a single receiver |
|
|
Term
|
Definition
| used to pick up any packets that are being transmitted by other WLANs in the area and can provide additional information on transmissions |
|
|
Term
|
Definition
| scans the radio frequency spectrum and provides a graphical display of the results |
|
|
Term
|
Definition
| measurement tool that is specifically designed for conducting a wireless LAN site survey |
|
|
Term
|
Definition
| range of coverage for a specific transmission speed |
|
|
Term
|
Definition
| number of packets sent and received and the data rates for each |
|
|