Wireless LAN and Wi-Fi Basics
96 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What frequency band does microwave transmission in WLAN products typically operate at?

  • 5.725 GHz
  • 2.4 GHz
  • 18 GHz (correct)
  • 900 MHz
  • Which method does spread spectrum transmission NOT utilize?

  • Packet switching (correct)
  • Frequency hopping
  • Code Division Multiple Access
  • Direct sequence modulation
  • In frequency hopping, what does the transmitter do if it detects that a channel is full?

  • Transmits at a lower power level
  • Stops all transmission
  • Continues to transmit until interrupted
  • Hops to another channel (correct)
  • What is the purpose of the code transmitted with each signal in Direct Sequence Modulation?

    <p>To identify the appropriate signal for the receiver</p> Signup and view all the answers

    Which of the following describes directed infrared transmission?

    <p>Infrared light is focused to increase transmission speed</p> Signup and view all the answers

    What is the highest transmission speed achieved in infrared transmission methods?

    <p>Directed point-to-point infrared transmission</p> Signup and view all the answers

    Which component is NOT part of the IEEE 802.11 WLAN architecture?

    <p>Core Network Switch</p> Signup and view all the answers

    What is the ISM band reserved for?

    <p>Industrial, scientific, and medical devices</p> Signup and view all the answers

    What is the main function of the BSS Master in a WLAN setup?

    <p>To connect wireless clients to a wired LAN</p> Signup and view all the answers

    What is necessary for BSS Clients to connect to a BSS?

    <p>The same SSID</p> Signup and view all the answers

    What does an Extended Service Set (ESS) require for its BSSs?

    <p>A common service set identifier</p> Signup and view all the answers

    Which technology allows a distribution system to connect access points in an ESS?

    <p>WDS (Wireless Distribution System) or MESH protocols</p> Signup and view all the answers

    What happens to BSSs in an Extended Service Set from the perspective of the Logical Link Control layer?

    <p>They appear as a single BSS</p> Signup and view all the answers

    In what type of environment can WLANs be used according to the provided information?

    <p>From small home networks to large mobile networks</p> Signup and view all the answers

    What is one characteristic of the Service Set Identity (SSID)?

    <p>It must be between 2 and 32 alphanumeric characters</p> Signup and view all the answers

    Which best describes a wireless LAN hotspot?

    <p>A public access point often requiring no password</p> Signup and view all the answers

    Which wireless LAN standard operates at a frequency of 5.0 GHz?

    <p>802.11a</p> Signup and view all the answers

    What is the primary concern regarding security in wireless LANs compared to wired LANs?

    <p>They use a more open medium for communication.</p> Signup and view all the answers

    Which wireless LAN standard is considered obsolete due to its low performance?

    <p>802.11</p> Signup and view all the answers

    Which wireless LAN standard provides a performance of 108 Mbps but is not yet finalized?

    <p>802.11n</p> Signup and view all the answers

    What is one of the significant issues with wireless LANs as mentioned in the content?

    <p>They are affected by interference from other devices.</p> Signup and view all the answers

    What is one primary reason administrators should be vigilant with wireless networks?

    <p>To prevent unauthorized access</p> Signup and view all the answers

    Which encryption standard should generally be avoided due to its numerous flaws?

    <p>WEP</p> Signup and view all the answers

    Which of the following WLAN standards supports longer distances up to kilometers?

    <p>802.16d</p> Signup and view all the answers

    How does WPA enhance security compared to WEP?

    <p>By employing a per-packet key</p> Signup and view all the answers

    What is a common feature of Access Points (APs) in wireless networks?

    <p>They create hot spot areas for wireless coverage.</p> Signup and view all the answers

    Which wireless LAN standard combines the features of previous standards but is more costly?

    <p>802.11g</p> Signup and view all the answers

    What common feature is shared by both WPA and WPA2?

    <p>Wireless network certification by the Wi-Fi Alliance</p> Signup and view all the answers

    What does TKIP stand for in relation to the WPA protocol?

    <p>Temporary Key Integrity Protocol</p> Signup and view all the answers

    What is a drawback of the WEP encryption method?

    <p>It employs static encryption keys</p> Signup and view all the answers

    Which of the following describes WPA2 in terms of security?

    <p>Supports the same protocols as WPA</p> Signup and view all the answers

    Which key management approach distinguishes WPA from WEP?

    <p>Dynamic key generation for each data packet</p> Signup and view all the answers

    What is the main flaw of CRC in comparison to Michael?

    <p>CRC provides weaker data integrity guarantees.</p> Signup and view all the answers

    Which encryption mode is introduced by WPA2 for enhanced security?

    <p>CCMP</p> Signup and view all the answers

    What security measure is considered the first step towards securing a wireless network?

    <p>Disabling SSID broadcasting.</p> Signup and view all the answers

    Why is changing the default IP, username, and password on Access Points (APs) important?

    <p>To prevent unauthorized access.</p> Signup and view all the answers

    What is the primary purpose of MAC filtering in wireless security?

    <p>To prevent unauthorized access by specifying authorized MAC addresses</p> Signup and view all the answers

    Which of the following can help prevent unauthorized access to a network?

    <p>Configuring a firewall on access points</p> Signup and view all the answers

    What issue may arise from leaving the DHCP service enabled on an Access Point?

    <p>It allows unauthorized users access.</p> Signup and view all the answers

    Why should users avoid making important data transactions on public hotspots?

    <p>Public hotspots typically do not implement any security measures</p> Signup and view all the answers

    What characterizes the MAC address in networking?

    <p>It is a unique hardware address of 48 bits.</p> Signup and view all the answers

    Which aspect of WPA is notably weaker than that of WPA2?

    <p>The message integrity check algorithm.</p> Signup and view all the answers

    What should a user verify before using a public Wi-Fi network for sensitive transactions?

    <p>The legitimacy of the hotspot</p> Signup and view all the answers

    What is a key benefit of Wi-MAX technology?

    <p>It provides high-speed broadband over long distances without cables</p> Signup and view all the answers

    How frequently should AP passwords ideally be changed?

    <p>Every month.</p> Signup and view all the answers

    What is the IEEE standard associated with Wi-MAX technology?

    <p>IEEE 802.16</p> Signup and view all the answers

    Which of the following actions can enhance wireless network security for users?

    <p>Using strong and complex passwords for the network</p> Signup and view all the answers

    What does the WiMAX Forum aim to promote?

    <p>Interoperability and conformity of WiMAX standards</p> Signup and view all the answers

    What is the main flaw of the WEP encryption standard?

    <p>It is vulnerable to numerous known exploits.</p> Signup and view all the answers

    Which encryption method provides the strongest security for wireless networks?

    <p>WPA2</p> Signup and view all the answers

    How does WPA achieve better security compared to WEP?

    <p>Through the implementation of per-packet key generation.</p> Signup and view all the answers

    What is a characteristic feature of WPA and WPA2 protocols?

    <p>They enable dynamic key generation per data packet.</p> Signup and view all the answers

    What distinguishes Wi-Fi from traditional wireless technologies?

    <p>Wi-Fi supports high speed data communication via wireless protocols.</p> Signup and view all the answers

    What role does an access point serve in a WLAN?

    <p>It acts as a central transmitter and receiver of WLAN signals.</p> Signup and view all the answers

    Which component of WPA helps prevent attackers from altering data packets?

    <p>Message Integrity Check</p> Signup and view all the answers

    What is the primary reason to choose WPA2 over WPA?

    <p>WPA2 supports enhanced encryption methods.</p> Signup and view all the answers

    Which statement accurately reflects the function of the IEEE 802.11 protocol?

    <p>It uses Carrier Sense Multiple Access with Collision Avoidance for data handling.</p> Signup and view all the answers

    Which of the following best describes the Wireless Application Protocol (WAP)?

    <p>WAP defines a network architecture for content delivery across multiple wireless technologies.</p> Signup and view all the answers

    Which aspect of wireless network security is recommended for all devices on the network?

    <p>Using the same encryption scheme and password across devices.</p> Signup and view all the answers

    What is a common misconception about WEP?

    <p>It provides strong encryption comparable to wired networks.</p> Signup and view all the answers

    What is a primary principle behind the CSMA/CA protocol used in IEEE 802.11?

    <p>It requires devices to listen for signals before transmitting to avoid collisions.</p> Signup and view all the answers

    Which characteristic differentiates the WLAN from traditional LAN setups?

    <p>WLANs enable users to remain connected while moving within a limited area.</p> Signup and view all the answers

    What is a significant risk associated with using public Wi-Fi networks?

    <p>Users may inadvertently expose sensitive data to unauthorized parties.</p> Signup and view all the answers

    Which of the following characterizes the primary function of MAC filtering in WLAN security?

    <p>To allow only specific devices to connect to the network.</p> Signup and view all the answers

    Which wireless LAN standard is NOT prominently used due to its performance limitations?

    <p>802.11h &amp; j</p> Signup and view all the answers

    What key challenge does wireless LAN security face compared to wired LANs?

    <p>Limited physical access control</p> Signup and view all the answers

    Which characteristic distinguishes the 802.11g standard from other WLAN standards?

    <p>It combines features of previous standards but is the least cost-effective.</p> Signup and view all the answers

    Which factor significantly impacts the stability of wireless networks?

    <p>Interference from other wireless devices</p> Signup and view all the answers

    What is the main advantage of using MAC filtering in network security?

    <p>It prevents unauthorized devices from accessing the network.</p> Signup and view all the answers

    What is the bandwidth of the 802.11a wireless LAN standard?

    <p>54 Mbps</p> Signup and view all the answers

    Which encryption protocol is known for its numerous vulnerabilities and should generally be avoided?

    <p>Wired Equivalent Privacy (WEP)</p> Signup and view all the answers

    What is a primary security risk associated with Access Points (APs) in wireless networks?

    <p>They can allow unauthorized access to the network.</p> Signup and view all the answers

    Why is it advised not to use public hotspots for sensitive transactions?

    <p>Public hotspots often lack encryption and security measures.</p> Signup and view all the answers

    Which standard should generally be avoided for wireless security due to its flaws?

    <p>WEP</p> Signup and view all the answers

    What defines Wi-MAX technology in terms of its capability?

    <p>It can provide broadband speeds up to 10 Mbps over long distances.</p> Signup and view all the answers

    In terms of performance, which wireless LAN standard is considered obsolete?

    <p>802.11b</p> Signup and view all the answers

    Which of the following actions can help prevent unauthorized access to a wireless network?

    <p>Regularly changing your AP passwords.</p> Signup and view all the answers

    What essential verification should a user perform before engaging in sensitive transactions on a public Wi-Fi network?

    <p>Verify the legitimacy of the hotspot being used.</p> Signup and view all the answers

    Which feature is typically emphasized in firewall settings for enhanced security in access points?

    <p>Blocking unauthorized external access to local services.</p> Signup and view all the answers

    What transmission mode does Wi-MAX technology utilize for its long-range network capability?

    <p>Point-to-multipoint connections.</p> Signup and view all the answers

    What is the primary reason for implementing CCMP in WPA2?

    <p>To enhance encryption strength using AES</p> Signup and view all the answers

    How does disabling SSID broadcasting contribute to wireless security?

    <p>It reduces the likelihood of detection by casual attackers</p> Signup and view all the answers

    What is a significant flaw associated with the Michael algorithm used in WPA?

    <p>It allows key recovery through packet analysis</p> Signup and view all the answers

    Which security measure should be taken regarding DHCP services in Access Points?

    <p>DHCP should be disabled to prevent unauthorized access</p> Signup and view all the answers

    What is the primary reason for regularly changing the default password of an Access Point (AP)?

    <p>To prevent brute-force attacks from automated tools</p> Signup and view all the answers

    Why is it critical to implement strong encryption when providing public access to a wireless network?

    <p>To protect sensitive information from unauthorized access</p> Signup and view all the answers

    What does MAC filtering specifically achieve in a secured wireless network?

    <p>Restricts access based on unique hardware addresses</p> Signup and view all the answers

    Which aspect differentiates WPA2 from WPA in terms of security features?

    <p>WPA2 implements mandatory elements of IEEE 802.11i</p> Signup and view all the answers

    What does the SSID help a client device to accomplish in a wireless LAN?

    <p>Identify and select the correct access point to connect to</p> Signup and view all the answers

    What is the function of the BSSID in a wireless network?

    <p>To uniquely identify each Basic Service Set within a LAN</p> Signup and view all the answers

    When a mobile station transfers its association from one access point to another, which process is utilized?

    <p>Re-association</p> Signup and view all the answers

    Which statement best describes the privacy feature in the 802.11 standard?

    <p>It allows for optional encryption to keep messages confidential between intended recipients</p> Signup and view all the answers

    What characteristic differentiates a BSSID from an SSID in a wireless network?

    <p>BSSID uniquely identifies each BSS, whereas SSID is a shared name among multiple access points</p> Signup and view all the answers

    In terms of network management, why is the SSID significant?

    <p>It facilitates the broadcasting of a network name to users and devices</p> Signup and view all the answers

    What is an indication that a broadcast BSSID is being utilized?

    <p>The BSSID has a value that includes all 1s</p> Signup and view all the answers

    What is a key purpose of authentication in the context of the IEEE 802.11 standard?

    <p>To verify the identity of stations connecting to the network</p> Signup and view all the answers

    Study Notes

    Wireless LAN

    • Wireless LANs (WLANs) are similar to traditional LANs, but with a wireless interface.
    • WLAN technology is becoming popular due to the introduction of small, portable devices like PDAs.
    • WLANs provide high-speed data communication in small areas like buildings or offices.
    • Users can move around a confined area while staying connected to the network.
    • Wi-Fi is a synonym for IEEE 802.11 technology and IP Radio.

    Wi-Fi and Access Points

    • Wi-Fi-enabled devices (e.g., computers, video game consoles, mobile phones) can connect to the internet when within range of a wireless network.
    • Access points are nodes in WLANs that act as central transmitters and receivers of radio signals.
    • Home or small business access points are small, dedicated hardware devices usually containing a network adapter, antenna, and radio transmitter.
    • Access points support Wi-Fi wireless communication standards.

    Wireless Application Protocol (WAP)

    • WAP defines a network architecture for content delivery over wireless networks.
    • WAP implements protocols similar to well-known web protocols like HTTP, TCP, and SSL.
    • WAP enables global wireless communication across different wireless technologies (e.g., GSM, GPRS, UMTS, 3G).

    IEEE 802.11 Layered Protocol Architecture

    • Association: Establishes an initial connection between a station and an access point.
    • Re-Association: Allows transferring an existing association from one access point to another.
    • Dis-association: Notifies termination of an existing association.
    • Authentication: Establishes the identity of a station.
    • Privacy: Prevents message content from being read by unauthorized recipients using encryption.

    Service Set Identifier (SSID)

    • A name that identifies a specific 802.11 wireless LAN.
    • Client devices can receive broadcast messages from access points advertising their SSIDs.
    • SSIDs can be up to 32 characters long.
    • Multiple access points can share the same SSID if they provide access to the same network.

    Basic Service Set Identifier (BSSID)

    • Uniquely identifies each Basic Service Set (BSS) in an infrastructure BSS.
    • The BSSID is the MAC address of the wireless access point (WAP).
    • In an Independent Basic Service Set (IBSS), the BSSID is a locally generated 48-bit random number with the individual/group bit set to 0 and the universal/local bit set to 1.
    • A BSSID with a value of all 1s indicates a broadcast BSSID.

    Transmission Technology

    • Microwave: Uses low-power microwave radio signals at the 18GHz frequency band.
    • Spread Spectrum: Uses frequency hopping and direct sequence modulation to transmit data. The signal spreads over a wider frequency range.
    • Infrared: Diffused, directed, or directed point-to-point transmissions using infrared light.

    WLAN Architecture

    • WLAN stations (STAs) and Access Points (APs) are the building blocks.
    • WLAN Stations: Locate and connect to access points to access network resources.
    • Access Points: Connect WLAN stations to a wired network.
    • Basic Service Set (BSS): The minimum BSS consists of two stations.
    • Independent Basic Service Set (IBSS) / Ad hoc network: Network of client devices without a controlling access point.
    • Extended Service Set (ESS): Interconnected BSSs that appear as a single BSS to the logical link control layer.
    • Distribution System (DS): Connects access points in an extended service set to increase network coverage.

    WLAN Applications and Standards

    • WLANs have applications from small home networks to large campus networks, to mobile networks on airplanes and trains.
    • Users can access the internet, connect to 3G/4G networks, and can use public access points.
    • IEEE 802.11 standards define WLAN protocols and frequencies. Specific standards and their bandwidths and performance are described.

    Wireless LAN Security

    • Security is a major concern due to the open nature of wireless communication.
    • Administrators and users should take precautions to prevent unauthorized access.
    • Security measures include encryption protocols (WEP, WPA, WPA2).
    • MAC filtering.
    • Firewall configuration is required for advanced security.

    Wi-MAX

    • Wi-MAX (Worldwide Interoperability for Microwave Access) is a long range wireless technology using a variety of transmission modes.
    • It provides wireless broadband access and telecommunications services.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Wireless LAN Chapter 6 PDF

    Description

    Explore the fundamentals of Wireless Local Area Networks (WLANs) and Wi-Fi technology. This quiz covers the essentials of WLAN functionality, Wi-Fi devices, access points, and the Wireless Application Protocol. Understand how wireless communication has transformed networking in various environments.

    More Like This

    Wireless LAN Quiz
    5 questions

    Wireless LAN Quiz

    EncouragingEuphoria avatar
    EncouragingEuphoria
    LAB03: Business Wireless LAN Network Designs
    9 questions
    Wireless LAN Overview
    72 questions

    Wireless LAN Overview

    SolicitousOklahomaCity avatar
    SolicitousOklahomaCity
    Use Quizgecko on...
    Browser
    Browser