Wireless Overview Flashcards Chapter 8
30 Questions
100 Views

Wireless Overview Flashcards Chapter 8

Created by
@AmicableNeodymium

Questions and Answers

Which of the following is used on a wireless network to identify the network name?

  • BSSID
  • IP Address
  • MAC Address
  • SSID (correct)
  • Which of the following is generated after a site survey and shows the Wi-Fi signal strength throughout the building?

  • Heat map (correct)
  • Frequency map
  • Network diagram
  • Signal report
  • You need to implement a wireless network link between two buildings on a college campus. Which type of wireless antenna should you use on each side of the link? (Select two.)

  • Omni-directional
  • Dipole
  • High-gain (correct)
  • Parabolic (correct)
  • Where should you install the wireless LAN controller (WLC)?

    <p>Network closet</p> Signup and view all the answers

    Which type of wireless access point is generally used in a residential setting?

    <p>SOHO</p> Signup and view all the answers

    Which device would you most likely use to manage multiple access points in your organization?

    <p>WLC</p> Signup and view all the answers

    Which device would you use to perform a site survey?

    <p>Wi-Fi analyzer</p> Signup and view all the answers

    Which type of site surveys should be performed first?

    <p>Passive</p> Signup and view all the answers

    What is responsible for broadcasting information and data over radio waves?

    <p>Wireless access point</p> Signup and view all the answers

    Which class of wireless access point (WAP) has everything necessary to manage clients built into its functionality?

    <p>Fat</p> Signup and view all the answers

    What sends unsolicited business cards and messages to a Bluetooth device?

    <p>Bluejacking</p> Signup and view all the answers

    What best describes Bluesnarfing?

    <p>Viewing calendar, emails, and messages on a mobile device without authorization</p> Signup and view all the answers

    Which type of interference is caused by motors, heavy machinery, and fluorescent lights?

    <p>EMI</p> Signup and view all the answers

    What best describes an evil twin?

    <p>An access point that mimics a valid access point to obtain logon credentials and other sensitive information.</p> Signup and view all the answers

    Which type of attack is WEP extremely vulnerable to?

    <p>IV attack</p> Signup and view all the answers

    What type of attack are you most likely experiencing if clients complain about short bursts of high-intensity RF signals interfering with your wireless network signal?

    <p>Jamming</p> Signup and view all the answers

    What type of attack is being executed if an attacker has intercepted NFC data and is masquerading as the original device?

    <p>Relay</p> Signup and view all the answers

    Which type of RFID tag can send a signal over a long distance?

    <p>Active</p> Signup and view all the answers

    What type of security risk is present if an employee connects a wireless access point to the network in an unauthorized manner?

    <p>Rogue access point</p> Signup and view all the answers

    What should you do if you are concerned that wireless access points may have been deployed without authorization? (Select two.)

    <p>Conduct a site survey.</p> Signup and view all the answers

    What should you do to connect a laptop to a wireless network using WPA2-Personal and a pre-shared key?

    <p>Configure the connection with a pre-shared key and AES encryption.</p> Signup and view all the answers

    What is the most secure method for adding security to your wireless network?

    <p>WPA2</p> Signup and view all the answers

    What value uniquely identifies the network access point (AP) when configuring it?

    <p>SSID</p> Signup and view all the answers

    What should you implement to provide guests with a login page when they initially connect to the wireless network?

    <p>Implement a captive portal</p> Signup and view all the answers

    Which EAP implementation is most secure?

    <p>EAP-TLS</p> Signup and view all the answers

    Which method do switches and wireless access points use to control access through a device?

    <p>MAC address filtering</p> Signup and view all the answers

    Where would you configure passwords used for authentication with 802.1x on your wireless network?

    <p>On a RADIUS server</p> Signup and view all the answers

    What should you do to configure the new 802.11g wireless network while using Active Directory? (Select two.)

    <p>Install a RADIUS server and use 802.1x authentication.</p> Signup and view all the answers

    What should you do to prevent unauthorized users from using the access point (AP) configuration utility?

    <p>Change the administrative password on the AP.</p> Signup and view all the answers

    What components should be part of your design for configuring a wireless network using WPA2-Enterprise? (Select two.)

    <p>AES encryption</p> Signup and view all the answers

    Study Notes

    Wireless Network Fundamentals

    • SSID (Service Set Identifier) is the name used to identify a wireless network.
    • Heat map depicts Wi-Fi signal strength across a location and is created after site surveys.
    • High-gain and parabolic antennas are recommended for creating a wireless link between two buildings 100 meters apart.

    WLAN Components and Installation

    • A wireless LAN controller (WLC) should be installed in a secure location, such as a network closet.
    • SOHO (Small Office/Home Office) access points are commonly used in residential environments.

    Access Point Management

    • To manage multiple access points effectively in an organization, implement a WLC.
    • Use a Wi-Fi analyzer for conducting site surveys.

    Types of Site Surveys

    • The passive site survey should be conducted first to gather information without actively probing the network.

    Wireless Communication Devices

    • A wireless access point is responsible for transmitting information and data via radio waves.
    • Fat access points contain all necessary features to manage clients and broadcast the network.

    Bluetooth Security Vulnerabilities

    • Bluejacking involves sending unsolicited messages to a Bluetooth device.
    • Bluesnarfing refers to unauthorized viewing of data such as emails and messages on another person's device.

    Sources of Interference

    • EMI (Electromagnetic Interference) is created by motors, heavy machinery, and fluorescent lights.
    • Evil twin refers to a rogue access point designed to deceive users by mimicking a legitimate one.

    Wireless Security Threats

    • WEP (Wired Equivalent Privacy) is highly susceptible to an IV (Initialization Vector) attack.
    • Jamming is likely occurring if there are bursts of high-intensity RF signals disrupting the wireless network.

    NFC and RFID Attacks

    • A relay attack involves intercepting NFC data to impersonate a legitimate device.
    • Active RFID tags can transmit signals over long distances.

    Rogue Devices and Network Security

    • A rogue access point presents a significant security risk when unauthorized devices connect to the network.
    • To identify rogue access points, check MAC addresses of connected devices and conduct a thorough site survey.

    Secure Wireless Connections

    • Configure the connection to a hidden SSID using a pre-shared key and AES encryption for the strongest security.
    • Implement WPA2 to add robust security to your wireless network.

    Access Point Configuration

    • The SSID uniquely identifies a wireless access point and is crucial for successful manual configuration.
    • A captive portal can be used to restrict guest internet access, requiring verification via a code provided during check-in at hotels.

    EAP (Extensible Authentication Protocol)

    • EAP-TLS is recognized as the most secure implementation of EAP.

    Access Control Mechanisms

    • MAC address filtering is a common method used by switches and wireless access points to control access.
    • For 802.1x authentication, passwords must be configured on a RADIUS server.

    Transitioning to Wireless

    • When replacing a wired network with an 802.11g wireless network, utilize RADIUS servers and 802.1x authentication to secure the network.
    • Ensure devices in the wireless environment are operating in infrastructure mode.

    Access Point Security

    • Protect access point configuration utilities by changing the administrative password after installation.

    WPA2-Enterprise Configuration

    • For a WPA2-Enterprise wireless network, ensure inclusion of both 802.1x authentication and AES encryption in the design.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on wireless networking concepts with these flashcards from Chapter 8. Explore key terms like SSID and heat maps that are crucial for understanding wireless network implementation and signal strength analysis. Perfect for students and professionals looking to reinforce their understanding of wireless technology.

    More Quizzes Like This

    Wireless Networking &amp; Security Quiz
    10 questions
    Wireless Networking Quiz
    5 questions

    Wireless Networking Quiz

    UnwaveringSerpentine9573 avatar
    UnwaveringSerpentine9573
    Wireless Networking Security
    22 questions
    Use Quizgecko on...
    Browser
    Browser