• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/34

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

34 Cards in this Set

  • Front
  • Back

What wireless standard uses the 2.4 GHz frequency band, has 11 Mbps throughput, and a range of 100 meters?

802.11b


What wireless standard uses the 5 GHz frequency band, has 54 Mbps throughput, and a range of 20 meters?

802.11a

What wireless standard uses the 2.4 GHz frequency band, has 54 Mbps throughput, and a range of 100 meters?

802.11g

What wireless standard uses either 2.4 or 5 GHz frequency band, has 65-600 Mbps throughput, and a range of 400 meters?

802.11n

What wireless standard uses the 5 GHz frequency band, has 1.3 - 6.93 Gbps throughput?

802.11ac




Range is unknown at this time. 802.11ac is being released in three waves. Wave three will have a max theoretical throughput of 6.93 Gpbs. 802.11ac is the first wireless standard to reach speeds like gigabit Ethernet.

Issues signals along a single direction.

Unidirectional antenna or directional antenna

Issues wireless signals in all directions.

Omnidirectional antenna

When a wave encounters an obstacle and bounces off toward its source.

Reflection

When a wireless signal splits into secondary waves when it encounters an obstacle is known as what?

Diffraction

When a wireless signal breaks up into many signals due to encountering an object smaller than its own wavelength is called what? Usually reflects off of a surface in many directions.

Scattering

The 2.4 GHz band offers how many channels in the united states.




How many over seas?

11 in the U.S.


14 over seas

In this wireless structure nodes transmit directly to each other via wireless NICs. A wireless LAN where nodes communicate directly with each other.

ad hoc WLAN

Wireless LAN topology where nodes communicate with an access point and not each other.

Infrastructure WLAN

Wireless LAN topology where multiple access points work as peer devices providing more fault tolerance.

Mesh WLAN

A type of hacking attack in which a Bluetooth connection is used to send unsolicited data.

Bluejacking

A type of hacking attack in which a Bluetooth connection is used to download data without the owner's permission.

Bluesnarfing

This type of standard does not eliminate the potential for collisions, but minimizes collisions. It does this by checking the channel for for activity and if it does it waits a brief amount of time before checking the channel again.

CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance)

A situation in which nodes cannot collaborate to prevent collisions is known as what?




A node on one side of the coverage area is too far apart from other nodes of the same coverage area.

Hidden Node Problem

This protocol ensures packets are not inhibited by other transmissions.




Efficient for large transmission packets.




Decreases overall 802.11 efficiency.

RTS/CTS (Request to Send/Clear to Send)

A unique character string used to identify an access point.

SSID (Service Set Identifier)

In ______ scanning a wireless enabled PC listens on all channels with its frequency range for a special signal known as a _______ ________ that is issued by the access point.

Passive Scanning; beacon frame





In ________ ________ scanning, a computer transmits a special frame known as a ________.

Active scanning; probe

This type of access point is unauthorized by the network and can be used to steal data or access the network that trusts your system.

Rouge Access Point or Evil Twin

What is responsible for carrying data between stations in an 802.11 network?

Data Frames

How many address fields are in a 802.11 data frame?

4

Issues multiple signals strengths and increases the range of a signal and the data carrying capacity. This technology gives access point the ability to use multiple antennas.

MIMO (multiple input-multiple-output)

This technology allows access points to use multiple antennas to send multiple signals simultaneously.

MU-MIMO (Multiuser MIMO)

The combination of two adjacent 20MHz frequency bands to create one 40 MHz frequency band is known as what?

Channel Bonding

The use of an algorithm to scramble data into a format that can be read only reversing the algorithm is known as what?

Encryption

A wireless security in which keys are the same in all clients and access points (static keys). This means that there is a "community" key shared by everyone using the same access point.

WEP (Wired Equivalent Privacy)




Outdated security method

This wireless security method dynamically assigns every transmission its own key.

WPA (Wi-Fi Protected Access or Wireless Protected Access)

A security threat in which a person drives around searching for unprotected wireless data transmissions.

War Driving

In IEEE terminology, a group of stations that share an access point are said to be part of what?

BSS (Basic Service Set)

What four frequency bands are used in the 5.4 GHz range?

5.1 GHz


5.3 GHz


5.4 GHz


5.8 GHz