• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/128

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

128 Cards in this Set

  • Front
  • Back
At which layers do wireless networks operate?
Physical/Data Link
Which frequency range is considered the golden zone?
500 Mhz to 10 GHz
Antennae that focus signals in a narrow range are called _________.
Directional
Antennae that transmit signals in all directions are called __________.
Omnidirectional
Which type of antenna, assuming the same power output, allows signals to be sent over longer distances?
Directional
Write the inverse square law for wireless signal attenuation
S2 = S1 (R1/R2)^2
The wireless signal strength 10 feet from an access point is 75 mW. How strong is the signal 100 feet from the access point?
.75 mW
Which wireless propagation problem is described as the loss of signal strength due to interaction with air molecules, plants, and other things it passes through?
Absorbative attenuation
Which wireless propagation problem is described as the loss of signal strength due to the spreading of the signal as distance from the transmitter increases?
Inverse square law attenuation
Which wireless propagation problem is described as loss of signal strength due to the blocking of large or dense objects between transmitter and receiver?
Shadow zones
Which wireless propagation problem is described by the receiver receiving the same signal from direct and one or more reflected paths?
Multipath interference
Which wireless propagation problem is described by energy from other electrical devices that disrupt transmitted signals?
Electro-magnetic interference
What is the nomenclature for wireless LAN standards?
802.11
What is the primary difference between a wireless access point and a wireless router?
Access point extends the WLAN; wireless router contains the five functions, of which one is WLAN access.
What is the maximum range of a typical wireless LAN?
30-100 meters
Write the Shannon Equation
C=B[log(1+S/N)]
In the Shannon Equation, what does the variable C describe?
Maximum possible bandwidth
In the Shannon Equation, what does the variable B describe?
Channel bandwidth
In the Shannon Equation, what does the variable S/N describe?
Signal to noise ratio
True/False: The 802.11 protocols operate in unlicensed radio bands?
True
How many channels in the 2.4 GHz radio band are non-overlapping?
3
List the non-overlapping 2.4 radio channels
1,6,11
Which wireless propagation problems are greater in the 5 GHz radio band?
Shadow zones & Inverse square law attenuation
The maximum number of non-overlapping channels in the 5 GHz radio band is ________.
24
How wide are 802.11 channels usually?
20 MHz
Which wireless propagation problem is mitigated using spread-spectrum signal transmission?
Multipath interference
What is the dominant spread spectrum transmission method?
OFDM
Between a wireless laptop PC and an access point, what type of message is transmitted?
802.11 frame
Between a wireless access point and its wired Ethernet switch, what type of message is transmitted?
802.3 Frame
In wireless LANs, the handing off of a mobile host between access points is called _______.
Roaming
All wireless hosts and the access point that serves them transmit on the same channel. Why does this cause throughput to fall as the number of wireless hosts increase?
As more hosts join an access points, the time between transmission to avoid collisions will increase, resulting in decreased throughput.
What protocol is used to ensure that multiple wireless hosts on the same wireless LAN do not transmit simutaneously?
CSMA/CA + Ack
Is the CSMA/CA + Ack protocol reliable?
Yes
is the protocol CSMA/CA + Ack required for reasonably good operation of a wireless access point?
Yes
Which wireless protocols uses OFDM?
802.11g & n
What is the rated speed of 802.11g
54 Mbps
What is the rated speed of 802.11n
300 Mbps
Which two reasons does 802.11n provide faster speeds than 802.11g?
802.11n uses MIMO and has a greater channel bandwidth
Using two different antennas to send two or more simultaneous radio signals in the same channel to increase wireless speeds significantly is called?
MIMO
Which method brings both higher speeds and longer transmission distances to 802.11 wireless communication?
MIMO
People that search for unprotected worming access points are called?
War drivers
Unauthorized access points set up by employees are called ________ access points.
Rogue
People that park outside a company's premises and intercept a firm's data transmissions are called?
Drive-by hackers
The protection provided by 802.11 core security standards extends between which two components of the WLAN?
Wireless host and access point
Which of the following provides the weakest security to wireless networks?
WEP
The 802.11i security protocol is also known as _________.
WPA2
Which wireless security provides the strongest security to wireless networks?
WPA2
The encryption method used by 802.11i is known as __________.
AES-CCMP
What are the two modes of 802.11i operation?
802.1x (enterprise) mode and PSK (Personal) mode
The enterprise mode of 802.11i is also known as _________?
802.1x
What is the name of the protocol used by 802.1x central authentication server?
Radius
Why are extensible authentication protocols required for wireless access points but not for wired LAN connections?
In wireless LANs, it is difficult for an imposter to tap into an access line and break into a network. With access points, it is much easier for transmissions to be intercepted and mimicked.
What is the most common wireless EAP protocol (because it is favored by Microsoft)?
PEAP
In 802.11i, personal mode equates to _________.
Pre-shared key (PSK)
Describe why 802.11i PSK modes is different than WEP.
In WEP, all wireless users on an access point share the same key during all wireless communications. Hackers can exploit the same shared key by capturing large amounts of traffic and deciphering the key through commonalities in the transmitted data. In WPA2 PSK mode, only the initial authentication uses the shared key. After initial authentication, the access point sends the user an unshared session key that is unique to each user. Also, during ongoing communications, the session key changes often, making capturing of data for cryptographic analysis very difficult.
What is the main potential weakness of 802.11i PSK mode?
If the pre-shared key is short (less than 20 characters), hackers can use a brute-force attack to gain initial access to the wireless network.
Which threat is described as a malicious computer configured to act like a real access point?
Evil twin
Which method can be used to secure host-to-host communication from a man-in-the-middle attack?
VPNs
Which of the following provide end-to-end protection between a client operating anywhere on the Internet and a properly configured application server?
VPNs
Describe how a VPN protects against Evil Twins?
While Evil Twin access points can read all wireless transmissions from a wireless host, all communication between the client and server will be encrypted using a pre-shared key; this pre-shared key is embedded in the wireless host and not transmitted, therefore the Evil Twin can not copy the key to decrypt messages.
Name the three steps in access point placement.
1) Initial planning, 2) initial site survey and installation, 3) ongoing site security.
Which protocol is designed for use in Personal Area Networks (PANs)?
Bluetooth
Which of the protocol has a designed service range of up to 10 meters?
Bluetooth
Which wireless protocol operate in the 2.4 GHz service band?
Bluetooth & 802.11i
What two characteristics differ between classic, high-speed, and low-energy Bluetooth versions?
Transmission speed and power requirements
The type of control used by Bluetooth is called __________.
Master-slave control
True/False: A bluetooth master can have many slaves.
True
Bluetooth specifies transmissions at which network layers?
Physical and data link
What is the Bluetooth handshake called?
Peering
How wide are Bluetooth channels?
1 MHz
Bluetooth transmissions switch channels every 1600 microseconds to improve communication reliability and decrease interference with 802.11 transmissions. The protocol that manages this type of transmission is called ________.
Frequency hopping spread spectrum
How are passive RFID tags powered?
A powered device transmits sufficient power, at 13.56 kpbs operation frequency, which enables the RFID to generate a reply.
What is the main difference between active and passive RFID tags?
Active RFID tags contain batteries, passive do not.
What is the main concern for NFC, and RFID tags in particular?
Inadvertent reading of RFID information (such as for credit cards) by bad guys.
What are the three parts of the IPv4 hierarchical IP address?
Network part, subnet part, host part.
What is the maximum number of bits in an IPv4 IP address?
32
What part of the IPv4 IP address identifies smaller units of a host's network?
subnet part
What part of the IPv4 IP address identifies the host's network on the internet?
Network part
In the IP address 10.11.13.13, what is the network part?
It is impossible to know without having the subnet mask available.
What type of router connects different networks?
Border routers
What type of router connects different subnets within a firm?
Internal routers
How many bits are in a subnet mask?
32
What is the purpose of the network/subnet mask?
To allow routers to determine the network part of an IP address for proper routing
What is the difference between a subnet mask and a network mask?
In a network mask, the initial 1's pf the mask identify the network part of the address. In a subnet mask, the initial 1's of the mask identify the network and subnet parts of the address.
What do switches use in determining switching decisions?
Switching tables
What do routers use in making routing decisions?
Routing tables
What addresses do switches use in making switching decisions?
Destination MAC addresses
What addresses do switches use in making routing decisions?
Destination IP addresses
Why is Ethernet switching so much more efficient than IP routing on the Internet?
First, Ethernet switches are configured in a hierarchical topology with only one possible active path for a frame to transit inside a local network. Second, Ethernet switching tables contain rows that have each unique MAC address on the row; once the table reaches the row with the matching MAC address, it sends the frame out that respective port of the switch. In contrast, the Internet is a mesh network topology with many possible paths for an IP packet to take in its transit. Routers may have many rows in their routing tables that match a portion of the destination IP address; each row of a routing table must be examined for every packet routed. Thus, routers not only have to sort through many more rows of its routing table, but then has to execute a decision based upon one or more metrics.
What are the three steps of a routing decision?
Step 1, find all matching rows. Step 2, find the best-match row. Step 3, send the packet back out.
What is the purpose of the default row in a routing table?
The default row in a routing table is the last row in a routing table. Its purpose is to provide a match to every IP address so that the router has at least one choice in deciding where to route a packet.
What is the longest match rule?
When determining which row of a routing table to follow, the router chooses the row that has the longest mask possible, as this is the row that gets the packet closet to its destination.
How do routers decide which row/route to choose if two or more rows have the same match length?
In case of a tie for longest match, the tie-breaker is to use the metric column, which describes the goodness of a route. Lower cost in the metric column is better.
What are router ports called?
Interfaces
When routing between subnets, what must be designed in the routing table?
The net-hop router
What is used when a router uses a previous decision for routing a packet instead of going through the 3-step routing decision process?
Decision cache
An arriving packet has the destination IP address of 128.171.180.13. Row 86 of the routing table has the destination value of 182.171.160.0 with a mask of 255.255.224.0. Does this row match the destination IP address? Explain.
When examining masks that do not break at the natural 8 bit boundary, focus on the mask that follows the last .255. In this case, the first two octets have full .255 masks; the third octet is .224, so we focus on that octet. Applying the mask to the destination IP address, we get 128.171 and then need to calculate the impact of the mask: the binary representation of 180 = 1 0 1 1 0 1 0 0; the binary representation of 224 = 1 1 1 0 0 0 0 0; the result of masking = 1 0 1 0 0 0 0 0 = 160; Therefore, the resulting IP address for row 86 = 128.171.160.0. This shows that row 86 is a match. masks that do not break at the natural 8 bit boundary, focus on the mask that follows the last .255. In this case, the first two octets have full .255 masks; the third octet is .224, so we focus on that octet. Applying the mask to the destination IP address, we get 128.171 and then need to calculate the impact of the mask:
A router determines the path for a packet to reach either a next-hop router or its final destination, but does not know how to forward the packet at the layer-2 frame level. How does a router determine a host s data link layer address?
Routers use the Address Resolution Protocol (ARP)
Explain the ARP process.
1) Router creates an ARP request message and broadcasts the ARP packet to all hosts on the subnet. 2) Every host on the subnet examines the ARP packet and compares to its own IP address. The host has a matching IP address sends an ARP response message that includes its 48 bit MAC address. 3) The router logs the MAC address for that IP address and forwards the IP packet inside of a frame
What is it called when routers save time by saving previous ARP responses?
ARP caching
In which layer does the ARP protocol belong?
Internet
What is the purpose of the TTL field in an IPv4 packet?
To prevent misaddressed packets from circulating endlessly on the internet, routers decrease the Time-To-Live field of an IP packet by one each time it forwards the packet. When the TTL=0, the receiving router will discard the packet.
What is the purpose of the Protocol field in an IPv4 packet?
The protocol field value designates which process should receive the date field. ICMP = 1, TCP = 6, UDP=14/
What three IPv4 packet fields are associated with IP-Layer fragmentation?
Indentification, flags, Fragment offset
What is the first field in an IPv4 packet, how long is it (in bits), and what is its value (in binary)?
Version, 4 bits, 0100
Which IPv4 packet field can be used for marking priority and other service parameters?`
Diff-serv
What are the first four fields in a TCP segment, and how long is each?
Source port (16 bits), Destination port (16 bits), sequence number (32 bits), Acknowledgement number (32 bits)
What are the six TCP flag bits?
Urgent, FIN, Reset, Ack, Push, Syn
What is the range of well-known port numbers?
1-1023
What is the typical range of ports used by Microsoft clients, and what is the range of ports called?
1024-4999, ephemeral ports
What is an IP socket? Provide an example.
A socket is the combination of an IP address and a port number that designates a specific application on a specific host. 192.168.1.13:80
What are the port numbers of FTP (data and control), SFTP/SSH, SMTP, Telnet, HTTP, HTTPS, and DNS?
FTP data =20, FTP control =21, SFTP/SSH = 22, SMTP=25, Telnet = 23, HTTP = 80, HTTPs=443, DNS = 53
What are the three popular interior dynamic routing protocols?
Routing Information Protocol (RIP), Open Shortest Path First (OSPF), and Enhanced Interior Gateway Routing Protocol (EIGRP)
Which routing protocol is used for small autonomous systems with minimal security concerns?
RIP
Which routing protocol is used for large autonomous systems that only use TCP/IP?
OSPF
What is the name of the Cisco Systems routing protocol that is not limited to TCP/IP routing?
EIGRP
What are the two types of routing protocols?
Internal and external protocols.
What is the primary metric of RIP?
Number of hops needed to the destination host.
What are the components of the metric used by OSPF to determine path choice?
Cost, throughput, and traffic delays.
Which interior routing protocol would you use if you have a moderately big corporate internet with strong security requirements?
OSPF
What are the components of the metric used by EIGRP to determine path choice?
Interface bandwidth, load on the interface, delay, and reliability
What is the predominant external dynamic routing protocol?
Border Gateway Protocol (BGP)
What is the name of the protocol that deals with supervisory messages at the Internet layer?
Internal Control Message Protocol (ICMP)
What is the name of at least one ICMP message?
Ping, netstat, tracerout
What is an ICMP echo request often called?
Ping
Networks using the MPLS standard making routing decisions using _________?
Label switched paths
What are the benefits of using MPLS?
1) Reduces forwarding costs 2) premits traffic engineering 3) permits quality of service
Would it be easy or hard to implement MPLS accross the entire internet and why/why not?
It would be very difficult because you would have to coordinate with many, many ISPs on determination of label-switched paths. This coordination would be difficult as there will be conflicts between ISP priorities and network management philosophies."