• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back

The amount of output power and usable frequency ranges for wireless devices are determined by which organization?


regulatory authorities

What role d o wireless repeaters play in wireless networking

they are used to extend the basic service area

Bluetooth uses what modulation type?

Frequency Hopping spread spectrum

Uses three radio chains per band and multiple input/multiple output to transmit data?


802.11n

Operates in 2.4 GHz Industrial, Scientific, and Medical band and supports data rates up to 54 Mbps?

802.11b/g

A high Rate/DSSS channel used to transmit data over 802.11g is _______ wide?

20 MHz

802.11g wireless networks can operate in which unlicensed RF band?

2.4GHz

What can contribute to VSWR in 802.11g?

Impedance Mismatch

THE SSID is also known as what?

Name of th network

WPA2 requires ____ for the encryption mechanism and _____ for the cipher

CCMP and AES

The access method that 802.11a uses to get control of a wirelss medium in order to transmit data is called what?

(CSMA/CA)

A beacon is an example of what type of frame?

Management Frame

802.11n use an enhanced radio technolgy known as MIMO. which statement correctly describes a benefit of MIMO?

Increase in range and speedvia multipath

WPA was developed as an interim solution for which amendment to the 802.11 standard?

802.11i

According to the 802.11a amendment, which of the following data rates are mandatory?

6, 12, adn 24 Mbps

Statis outupt transmit power of a small office or home office AP is typically:

15 Dbm and 32 Mw

802.11a/b/g/n devices use what type of communication?

Half duplex

High Rate/ DSSS devices operate in which frequency range?

2.4GHz

How many access points can be co-located without overlapping in 802.11g?

3

Which 802.11 is multiple radio chains and multiple antennas?

802.11n, 802.11ac

Which network access method attempts to avoid collisons?

CMSA/CA

without any regulatory domain taken into consideration, the 2.4 GHz freq allows for how many channels using 802.11b?

14

What is maximum data rate of HR/DSSS 802.11b devices?

11 Mbits

How many non-overlapping channels availble in unlicensed 2.4 GHz Industrial, Scientific, and Medical band?

3 channels

When a WLAN device listens for beacon frames, it is participaing in which phase?

Passive Scanning

Which Radio Frequency channels are considered non-overlapping for 802.11g network?

1, 6, 11

802.11b is capable of which of the fllowing data rates?

1, 2, 5.5, 11 Mbps

What otions are available when configuring WPA2?

personal and enterprise

Wireless bridges mus be configured with ______ and _____?

Same SSID and Same RF channel

APs work at which layer of the OSI model?

Layer1 and 2

Which freq ranges are used in 802.11a?

5 GHz

128-bit WEP encrytion uses a user-provided static key of what size?

24 bit or 104 bit

When SSID cloaking is enabled, which of the folowing occurs?

Null beacon probe response

128bit WEP Privacy encrytion uses ____ Initialization Vector and a _____ static key.

24 bit and 128 bit

When an attack passively captures and examines wireless frames from a victim's network, what type of attack is taking place?

Eavesdropping

Which of these attacks are considered DOS attacks?


Deauthentication spoofing


Jamming


Attacks


Floods

Which of these encryption technologies have been cracked?

64bit and 128bit WEP

Which of these attacks would typically be associated with malicious eavesdropping?


Packet reconstruction


Protocol Analyze capture

Which of thse attacks are considred layer 2 denial of service attacks?

All previous DOS minus Jamming