IEEE 802 Standards Overview
35 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the name of the IEEE standard for wireless networking based on spread spectrum radio transmission?

802.11

What are the two frequency bands used by 802.11 standards for wireless networking?

  • 1.2 GHz and 3.6 GHz
  • 1.2 GHz and 2.4 GHz
  • 2.4 GHz and 5 GHz (correct)
  • 3.6 GHz and 5 GHz
  • What does the 802.11h amendment define?

    A Dynamic Frequency Selection (DFS) mechanism

    What does the 802.1p standard define?

    <p>A 3-bit priority field within the 802.1Q format (B)</p> Signup and view all the answers

    What does the 802.1q protocol provide?

    <p>Tagging frames destined for different VLANs across trunk links</p> Signup and view all the answers

    What is another name for the 802.1x standard?

    <p>Port-based network access control</p> Signup and view all the answers

    What layers of the OSI model do the 802.3 Ethernet standards describe?

    <p>Layers 1 and 2</p> Signup and view all the answers

    What determines which subjects are allowed or denied access to an object in an access control list (ACL)?

    <p>Access control entries (ACEs)</p> Signup and view all the answers

    What is the purpose of an access point (AP) in a wireless network?

    <p>To provide a connection between wireless devices and wired networks</p> Signup and view all the answers

    What is the lowest tier in a hierarchical network topology and what is its role?

    <p>The access/edge layer</p> Signup and view all the answers

    Describe the active-active high availability cluster configuration.

    <p>All nodes are utilized continually</p> Signup and view all the answers

    What is another name for an ad hoc network?

    <p>Independent Basic Service Set (IBSS)</p> Signup and view all the answers

    What is the purpose of the address resolution protocol (ARP)?

    <p>To match the hardware MAC address of an interface to an IP address on a local network segment</p> Signup and view all the answers

    What is the term for a unique identifier for a network node?

    <p>Addressing</p> Signup and view all the answers

    What is the problem known as adjacent channel interference?

    <p>Access points within range of one another are configured to use different but overlapping channels</p> Signup and view all the answers

    What is the term used to determine the trustworthiness of routes derived from different routing protocols?

    <p>Administrative distance (AD)</p> Signup and view all the answers

    What does it mean when a switch or router port is administratively down?

    <p>The port has been purposefully disabled via the management interface</p> Signup and view all the answers

    What is an advanced persistent threat (APT)?

    <p>Threat actors with the ability to craft novel exploits and techniques to obtain, maintain, and diversify unauthorized access to network systems over a long period</p> Signup and view all the answers

    What is the APC connector finishing type used for fiber optic connections?

    <p>Angled physical contact</p> Signup and view all the answers

    What are the two main types of antenna?

    <p>Omnidirectional and unidirectional</p> Signup and view all the answers

    What is anycast?

    <p>IP delivery mechanism whereby a packet is addressed to a single host from a group sharing the same address</p> Signup and view all the answers

    What is the name and layer of the OSI model that provides support to applications requiring network services?

    <p>Application layer (Layer 7)</p> Signup and view all the answers

    What is the purpose of an application programming interface (API)?

    <p>To allow other scripts or apps to interact with a script, program, or web application</p> Signup and view all the answers

    What does the arp command do?

    <p>It displays and modifies contents of host's cache of IP to MAC address mappings resolved by address resolution protocol (ARP) replies</p> Signup and view all the answers

    Describe arp spoofing.

    <p>A network-based attack where an attacker with access to the target local network segment redirects an IP address to the MAC address of a computer that is not the intended recipient</p> Signup and view all the answers

    What is attenuation?

    <p>The degradation of a signal as it travels over media</p> Signup and view all the answers

    What does the authentication header (AH) protocol provide?

    <p>Authentication for the origin of transmitted data as well as integrity and protection against replay attacks</p> Signup and view all the answers

    What is the purpose of an authoritative name server?

    <p>To hold a complete copy of zone records for a domain</p> Signup and view all the answers

    What is automatic private IP addressing (APIPA)?

    <p>A mechanism for Windows hosts configured to obtain an address automatically that cannot contact a DHCP server to revert to using an address from the range 169.254.x.y</p> Signup and view all the answers

    What is the general term for using scripts and APIs to automate tasks without manual intervention?

    <p>Automation</p> Signup and view all the answers

    What is an autonomous system (AS)?

    <p>A group of network prefixes under the administrative control of a single organization used to establish routing boundaries</p> Signup and view all the answers

    What is availability monitoring?

    <p>Processes and tools that facilitate reporting and alerting when a host or app cannot be contacted over the network</p> Signup and view all the answers

    What are backup configurations?

    <p>Configuration settings that will be applied if an appliance, instance, or app is restored from backup media</p> Signup and view all the answers

    Describe band steering.

    <p>A feature of Wi-Fi that allows an access point to try to ensure that clients use a particular frequency band, such as 5 GHz rather than 2.4 GHz</p> Signup and view all the answers

    What is the general term for the amount of data that can be transferred through a connection over a given period?

    <p>Bandwidth</p> Signup and view all the answers

    Study Notes

    802 Standards

    • 802.11 standards: IEEE standards for wireless networking, using 2.4 GHz and 5 GHz bands, including a, b, g, n, ac, and ax iterations. Variations dictate modulation, distance, data rates, and features like channel bonding, MIMO, and MU-MIMO.
    • 802.11h: Amendment to Wi-Fi standards, defining Dynamic Frequency Selection (DFS) to avoid interference with radar and cellular communications in the 5 GHz band.
    • 802.1p: IEEE standard defining a 3-bit priority field within the 802.1Q format.
    • 802.1q: Trunking protocol enabling switches to exchange VLAN configuration data, often tagging frames for different VLANs across trunk links.
    • 802.1x: Standard for encapsulating EAP communications over a LAN (EAPoL) to perform port-based authentication, also called port-based network access control (IEEE 802.1X).
    • 802.3 ethernet standards: IEEE 802.3 series describes media types, access methods, data rates, and distance limitations at OSI layers 1 and 2 using xBASE-y designations.

    Networking Concepts

    • Access Control List (ACL): Collection of access control entries (ACEs) controlling access to objects, defining allowed subjects and privileges (read-only, read/write).
    • Access Point (AP): Wireless device connecting wireless devices & wired networks, implementing an infrastructure mode WLAN.
    • Access/Edge Layer: Lowest hierarchical network layer, the entry point for end systems.
    • Active-Active: High availability cluster configuration, utilizing all nodes continuously.
    • Active-Passive: High availability cluster configuration, using one or more nodes only during failover.
    • Ad Hoc Network: Wireless network where devices communicate directly, also called Independent Basic Service Set (IBSS).
    • Address Resolution Protocol (ARP): Broadcast mechanism matching hardware MAC addresses to IP addresses on a local network segment.
    • Addressing: Unique identifiers for network nodes (MAC address, IPv4 address, IPv6 address).
    • Adjacent Channel Interference (ACI): Troubleshooting issue where access points on overlapping channels cause increased noise.
    • Administrative Distance (AD): Metric assessing the trustworthiness of routes from different routing protocols.
    • Administratively Down: Purposefully disabled switch or router port via management.
    • Advanced Persistent Threat (APT): Sophisticated threat actors maintaining extended unauthorized access to network systems.
    • Angled Physical Contact (APC): Fiber optic connector type using an angled ferrule polish.
    • Antenna Type: Metal wires for sending and receiving radio signals (omnidirectional or unidirectional).
    • Anycast: IP delivery method where a packet is addressed to a single host from a group sharing the same address.
    • Application Layer (Layer 7): OSI model layer supporting application network services (file transfer, printing, email).
    • Application Programming Interface (API): Methods allowing scripts or apps to interact with other programs or web applications.
    • ARP Command: Utility displaying and modifying IP-to-MAC address mappings.
    • ARP Spoofing: Network attack redirecting IP address to a non-intended MAC address, creating DoS, spoofing, or on-path attacks.
    • Attenuation: Signal degradation during transmission, impacting maximum media distance at a given bit rate.
    • Authentication Header (AH): IPSec protocol authenticating data origin, ensuring integrity, and preventing replay attacks.
    • Authoritative Name Server: DNS server holding a complete copy of zone records for a specific domain.
    • Automatic Private IP Addressing (APIPA): Windows feature automatically assigning address from the 169.254.x.y range when a DHCP server isn't found (link local address).
    • Automation: Using scripts and APIs for automatic system provisioning and deprovisioning.
    • Autonomous System (AS): Group of network prefixes under a single organization's control determining routing boundaries.
    • Availability Monitoring: Reporting and alerting tools checking host or application reachability.
    • Backup Configuration: Configuration settings for appliance restoration from backup media.
    • Band Steering: Wi-Fi feature guiding clients to a specific frequency band (e.g., 5 GHz).
    • Bandwidth: Measure of data transfer rate or range of frequencies supported by transmission media (Hertz).
    • Bandwidth Speed Tester: Utility to measure internet link speed or website response times.
    • Baseline Metrics: Values assessing service performance or stability based on historical data or vendor guidelines.
    • Basic Service Set Identifier (BSSID): MAC address of an access point supporting a basic service area.
    • Bayonet Neil-Concelman (BNC) Connector: Twist-and-lock connector for coaxial cable.
    • Bidirectional Wavelength Division Multiplexing (BWDM): Technology enabling bidirectional data transfer over a single fiber using different wavelengths for transmit and receive.
    • Bit Rate: Data transfer rate over a network connection (measured in bits/bytes/second).
    • Border Gateway Protocol (BGP): Path vector exterior gateway routing protocol used by ISPs to route between autonomous systems.
    • Botnet: Infected hosts controlled by a bot program for exploiting attacks.
    • Bottleneck: Network or system performance constraint from a single link, device, or subsystem.
    • Bridge: System isolating collision domains, joining segments within the same broadcast domain.
    • Bring Your Own Device (BYOD): Security framework and tools for personally owned devices accessing corporate networks.
    • Broadcast: Packet addressed to all hosts on a local network (routable).
    • Broadcast Domain: Network segment where all nodes receive broadcast frames.
    • Broadcast Storm: Amplified traffic caused by loops in switching, slowing and crashing switches.
    • Brute Force: Password attack trying every possible combination.
    • Bugfix: Software update addressing a single error.
    • Business Continuity Plan (BCP): Processes for maintaining business operations during adverse events.
    • Business Impact Analysis (BIA): Identifying organizational risks and their effect on critical operations.
    • Cable Crimper: Tool for joining network jacks to patch cables.
    • Cable Map: Physical plan of cable routes in a building.
    • Cable Stripper: Tool for stripping cable jackets or insulation.
    • Cable Tester: Tool confirming end-to-end cable connection.
    • Canonical Notation: Format for representing IPv6 addresses using hex, colon delimitation, and zero compression.
    • Captive Portal: Web page requiring client authentication for network access.
    • Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA): Contention mechanism used by 802.11 Wi-Fi.
    • Carrier Sense Multiple Access with Collision Detection (CSMA/CD): Contention-based protocol detecting collisions on shared media.
    • Categories of Cable Standards: ANSI/TIA/EIA cable category designations.
    • Cellular Radio: Data access standards over cellular networks (2G, 3G, 4G, 5G).
    • Certificate Authority (CA): Server issuing digital certificates ensuring subject identity.
    • Change Management: Process for approving, preparing, supporting, and managing new or updated systems.
    • Channel Bonding: Aggregating adjacent channels for increased bandwidth.
    • CIA Triad: Principles of security control—confidentiality, integrity, and availability.
    • Cipher Suite: Lists of cryptographic algorithms for secure connections.
    • Cisco Discovery Protocol (CDP): Cisco protocol discovering layer-2 neighbors.
    • Classful Addressing: Legacy IP addressing method determining the network ID automatically.
    • Classless Interdomain Routing (CIDR): Using network prefixes to aggregate routes.
    • Client-Server: Administration model where servers provide services and clients consume them.
    • Cloud Access Security Broker (CASB): Enterprise software mediating cloud service access.
    • Cloud Deployment Model: Classifying cloud ownership and management (public, private, community, hybrid).
    • Cloud Direct Connection: Dedicated link between on-premises network and cloud service provider.
    • Cloud Gateway: Virtual router facilitating routing between subnets and public networks in cloud infrastructure.
    • Cloud Service Model: Classifying cloud service provision (software, platform, infrastructure).
    • Clustering: Load balancing technique using a group of servers working together.
    • Coarse Wavelength Division Multiplexing (CWDM): Technology for multiplexing signals on a single fibre.
    • Coaxial: Two-conductor media type using a common axis (RG specifications).
    • Co-channel Interference (CCI): Troubleshooting issue where access points use the same channel causing contention.
    • Cold Site: Predetermined alternate location for network rebuild after disasters.
    • Collapsed Core: Two-tier topology where access layer switches connect directly to a core layer.
    • Collision Domain: Network segment where nodes share access media.
    • Colocation: Deploying servers and network appliances in a shared datacenter.
    • Command and Control (C&C or C2): Attackers' infrastructure controlling botnet malware.
    • Community String: SNMP password-like value allowing management access to an agent.
    • Configuration Drift: Risk of systems deviating from baseline or golden configuration.
    • Configuration Management: Process maintaining controlled information systems components.
    • Configuration Monitoring: Reporting and alerting configurations deviating from baselines.
    • Content Filtering: Security measure blocking inappropriate content from email and internet traffic.
    • Convergence: Process where routers agree on network paths (steady state).
    • Core Layer: Highest layer in a hierarchical topology, providing interconnection.
    • Crosstalk: Interference between wires due to close proximity.
    • Cryptographic Hash Algorithm: Function converting variable-length input to fixed-length output.
    • Cyclic Redundancy Check (CRC): Checksum calculation detecting errors in frames.
    • Data at Rest: Stored information.
    • Data Center Interconnect (DCI): Technologies linking hosts in separated datacenter facilities.
    • Data in Transit: Information being transmitted between hosts.
    • Data Link Layer (Layer 2): OSI layer transferring data between network nodes.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    This quiz covers the various IEEE 802 standards related to networking, including wireless protocols like 802.11 and Ethernet standards like 802.3. You'll learn about different amendments, VLAN configurations, and network access control mechanisms. Test your knowledge on the key features and functionalities of these critical networking standards.

    More Like This

    Wi-Fi teadmiste test
    44 questions
    Wireless Mobile & Multimedia Networking
    39 questions
    Use Quizgecko on...
    Browser
    Browser