Wireless Communication Fundamentals
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What does GSM stand for in wireless communications?

  • Generic System for Mobile Communications
  • Global System for Mobile Communications (correct)
  • Global Standard for Mobile Communication
  • General System for Mobile Communications
  • What is represented by BSSID in a wireless network?

  • Basic Service Set Identifier (correct)
  • Base Station Service Identifier
  • Broadband Service Set Identifier
  • Binary Service Set Identifier
  • Which of the following best describes bandwidth in a wireless network?

  • The maximum distance between two access points
  • The speed at which devices connect to the network
  • The total number of users on the network
  • The data transfer rate measured in bits per second (correct)
  • What role does an Access Point (AP) serve in a wireless network?

    <p>It connects wireless devices to wired networks.</p> Signup and view all the answers

    What is an SSID in the context of wireless networks?

    <p>Service Set Identifier</p> Signup and view all the answers

    What technique does MIMO-OFDM primarily influence in wireless communication services?

    <p>Channel robustness</p> Signup and view all the answers

    Which wireless technology is primarily associated with utilizing techniques such as DSSS, FHSS, and OFDM?

    <p>Wi-Fi</p> Signup and view all the answers

    What is a key advantage of using a wireless network compared to a wired network?

    <p>Flexible mobility for users</p> Signup and view all the answers

    Which of the following is a characteristic of Direct-sequence spread spectrum (DSSS)?

    <p>Uses a pseudo-random noise code for signal protection</p> Signup and view all the answers

    What type of equipment can create interference with Wi-Fi networks?

    <p>Microwave ovens and similar devices</p> Signup and view all the answers

    What is the main purpose of the shared key authentication process in wireless networks?

    <p>To authenticate a wireless station before allowing network access</p> Signup and view all the answers

    Which type of antenna is designed to radiate signals in all directions?

    <p>Omnidirectional Antenna</p> Signup and view all the answers

    What encryption method is associated with the highest security level in wireless networks?

    <p>Wi-Fi Protected Access 3 (WPA3)</p> Signup and view all the answers

    What does the 802.1X standard primarily facilitate in a wireless network?

    <p>Centralized authentication of wireless clients</p> Signup and view all the answers

    What is a potential risk associated with using a parabolic grid antenna?

    <p>Weak security against eavesdropping</p> Signup and view all the answers

    What role does the SSID play in a Wi-Fi network?

    <p>It acts as a name tag for the Wi-Fi network visible to users.</p> Signup and view all the answers

    Which statement about the service set and SSID is true?

    <p>The SSID can be shared among different access points for seamless connectivity.</p> Signup and view all the answers

    What is a major security risk associated with using default SSIDs?

    <p>They can easily be identified by unauthorized users.</p> Signup and view all the answers

    In an open system authentication process, what happens during the 'Unchallenged Acceptance' stage?

    <p>The AP accepts the authentication request without verification.</p> Signup and view all the answers

    How does the use of WEP encryption relate to open system authentication?

    <p>WEP can be enabled to exchange encryption keys after initial authentication.</p> Signup and view all the answers

    What encryption algorithm does WEP primarily utilize for securing wireless communications?

    <p>Rivest Cipher 4 (RC4)</p> Signup and view all the answers

    Which of the following is a significant flaw of WEP encryption?

    <p>It relies on a single shared key that is rarely changed.</p> Signup and view all the answers

    What role does the Initialization Vector (IV) play in the WEP encryption process?

    <p>It acts as a digital salt to differentiate packets.</p> Signup and view all the answers

    What is a major limitation of the CRC-32 checksum used in WEP?

    <p>It cannot detect alterations made by a third party.</p> Signup and view all the answers

    Which key length is used in a 128-bit WEP encryption setting?

    <p>104-bit key</p> Signup and view all the answers

    What is a main reason WEP is vulnerable to dictionary attacks?

    <p>The small IV space allows for the creation of a decryption table.</p> Signup and view all the answers

    What feature does WPA introduce to enhance security compared to WEP?

    <p>Implementation of a Message Integrity Check (MIC).</p> Signup and view all the answers

    How does the IV in WEP impact encryption security?

    <p>It is sent as part of the cleartext, making it predictable.</p> Signup and view all the answers

    What is a limitation of the WEP protocol regarding key management?

    <p>Lack of built-in provisions to update keys regularly.</p> Signup and view all the answers

    What is the significance of Temporal Keys (TKs) in the TKIP mechanism of WPA?

    <p>TKs are derived from the pairwise master key during EAP authentication.</p> Signup and view all the answers

    What is the primary function of the Michael Integrity Check (MIC) in TKIP?

    <p>To ensure the data has not been tampered with during transfer</p> Signup and view all the answers

    How does WPA2 enhance the security compared to WPA?

    <p>By replacing TKIP with AES and introducing CCMP</p> Signup and view all the answers

    Which vulnerability does TKIP address in comparison to WEP?

    <p>The predictable Initialization Vector (IV)</p> Signup and view all the answers

    What mechanism does TKIP use to prevent replay attacks?

    <p>A sequence counter</p> Signup and view all the answers

    In which mode does WPA2 use a central authentication server for access control?

    <p>WPA2-Enterprise</p> Signup and view all the answers

    What is the interval for changing the temporal keys in TKIP?

    <p>Every 10,000 packets</p> Signup and view all the answers

    What main issue arises from using weak passwords in WPA PSK?

    <p>It makes the PSK vulnerable to password-cracking attacks</p> Signup and view all the answers

    What does the per-packet key mixing in TKIP involve?

    <p>Combining a master key, MAC address, and sequence number</p> Signup and view all the answers

    Which of the following is a characteristic of WPA2-Personal?

    <p>Uses a single Pre-Shared Key for network access</p> Signup and view all the answers

    What allows attackers to inject malicious traffic in a network under TKIP?

    <p>Predictability of the group temporal key (GTK)</p> Signup and view all the answers

    Study Notes

    Wireless Network Concepts

    • A wireless network uses radio-frequency technology and electromagnetic (EM) waves for data communication, eliminating the need for multiple wired connections.
    • Wireless networks operate at the physical layer of a network structure.
    • Technologies like Wi-Fi (IEEE 802.11) provide wireless access within a range of an access point.
    • Wireless networks offer advantages like easy installation and flexible connectivity in difficult-to-wire areas; however, they may have security concerns and bandwidth limitations.

    Wireless Terminology

    • GSM: Global System for Mobile Communications, a global mobile data transmission standard.
    • Bandwidth: The amount of information transmitted over a connection, measured in bits per second (bps).
    • Access Point (AP): Connects wireless devices to a wired or wireless network, acting as a bridge between wired and wireless.
    • BSSID (Basic Service Set Identifier): The MAC address of an AP, defining a Basic Service Set (BSS). Users typically aren't aware of the specific BSS.
    • SSID (Service Set Identifier): A unique name for a wireless network (WLAN), allowing a user to select it from the available networks. All devices on the same WLAN must use the same SSID.
    • ISM Band: A set of frequencies used by industrial, scientific, and medical applications.
    • Hotspot: A public area with Wi-Fi access for users to connect to the internet.
    • Association: The process of connecting a wireless device to an access point (AP).
    • OFDM (Orthogonal Frequency-Division Multiplexing): A digital modulation method that splits a signal into multiple orthogonal frequencies, increasing data rates and sharing bandwidth.
    • MIMO-OFDM (Multiple-Input Multiple-Output Orthogonal Frequency-Division Multiplexing): A technique improving spectral efficiency in 4G and 5G wireless communication by reducing interference.
    • DSSS (Direct-Sequence Spread Spectrum): A spread spectrum technique adding a pseudo-random noise (PN) code to protect against interference and jamming.
    • FHSS (Frequency-Hopping Spread Spectrum) / FH-CDMA (Frequency-Hopping Code-Division Multiple Access): A method rapidly switching a carrier among many frequency channels for securing communications by preventing interception or jamming.

    Wireless Network Types

    • Extension to a Wired Network: Adding APs to extend the range and functionality of an existing wired network by bridging wireless devices with the network. Types of APs include software-based and hardware-based.
    • Multiple Access Points: Using multiple APs that overlap to enable seamless roaming between overlapping areas.
    • LAN-to-LAN Wireless Network: Connecting multiple LANs wirelessly for data exchange.
    • 3G/4G Hotspot: A portable device providing Wi-Fi access through a cellular signal.

    Wireless Standards

    • SSID: A 32 alphanumeric-character unique identifier for a WLAN, crucial for network identification and connection.
    • Service Set: A group of devices connected to the same Wi-Fi network with the same SSID.
    • Wi-Fi Authentication Modes: Methods such as open system authentication (least secure), shared key authentication (uses a secret key), and centralized authentication (typically requiring a RADIUS server). Open authentication has no real security; should not be used on private or business networks.

    Wireless Encryption Algorithms

    • WEP (Wired Equivalent Privacy): An older encryption standard, easily crackable due to vulnerabilities in its keys and IVs.

    • WPA (Wi-Fi Protected Access): An improved security protocol using Temporal Key Integrity Protocol (TKIP) for stronger encryption.

    • WPA2 (Wi-Fi Protected Access 2): A further enhancement using AES and CCMP, more secure than WPA.

      • WPA2-Personal and WPA2-Enterprise for different authentication methods. Personal uses a shared key, while Enterprise provides individual device authentication through RADIUS servers.
    • WPA3 (Wi-Fi Protected Access 3): The latest standard using the Simultaneous Authentication of Equals (SAE) protocol for enhanced security against offline attacks.

    Wireless Threats

    • Access Control Attacks:

      • WarDriving: Discovering WLANs by sending probe requests or listening.
      • Rogue Access Points: Unauthorized APs placed within a network to gain access.
      • MAC Spoofing: An attacker uses a forged MAC address to impersonate a legitimate AP to gain access.
      • AP Misconfiguration: A security risk from improper AP settings or default configurations.
    • Integrity Attacks:

      • Data Frame Injection: Sending forged frames to manipulate the network.
      • Bit-Flipping Attacks: Altering data packets by changing bits.
      • Replay Attacks: Reusing captured frames.
    • Confidentiality Attacks:

      • Eavesdropping: Intercepting network traffic without authorization.
      • Traffic Analysis: Inferring information from network traffic patterns.
      • Evil Twin APs: A fake AP mimicking a legitimate network to gain access.
      • Session Hijacking: Taking control of an ongoing network session.
    • Availability Attacks:

      • Denial-of-Service (DoS): Flooding the network with traffic to prevent legitimate users from accessing services.
      • Jamming Attacks: Causing interference by broadcasting strong signals that disrupt communications.
      • ARP Cache Poisoning: Manipulating ARP tables to redirect network traffic.

    Wireless Antennas

    • Directional Antennas: Focusing transmission and reception in特定 directions. Includes Yagi antennas.
    • Omnidirectional Antennas: Radiating in all directions equally, like those used in radio stations.
    • Parabolic Grid Antennas: Focusing radio signals over long distances.
    • Dipole Antennas: A bidirectional antenna using half a wavelength.
    • Reflector Antennas: Concentrating EM energy at a focal point.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on the key concepts of wireless communications, including BSSID, SSID, and the role of Access Points. This quiz covers various technologies and techniques used in the wireless network domain, ensuring you're well-versed in modern wireless standards.

    More Like This

    Use Quizgecko on...
    Browser
    Browser