Wireless Personal Area Network Overview
40 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following devices is NOT commonly found within a WPAN?

  • Smartphones
  • Smart televisions
  • Routers (correct)
  • Desktops
  • What is the primary function of a network interface card?

  • To connect devices directly to the internet
  • To manage and secure data on a network
  • To enable a device to connect to a network (correct)
  • To store files for network users
  • Which wireless communication standard is commonly associated with Bluetooth?

  • Infra-red (IR)
  • Microwave
  • Satellite
  • 802.11(x) (correct)
  • What role does a server play in a network?

    <p>To provide services and manage resources for other devices</p> Signup and view all the answers

    What is the purpose of a wireless access point?

    <p>To facilitate wireless communication among devices</p> Signup and view all the answers

    Which type of server is specifically used to store and manage files?

    <p>File server</p> Signup and view all the answers

    How do many devices achieve both wired and wireless connectivity?

    <p>By integrating both a network interface card and a wireless adapter</p> Signup and view all the answers

    Which of the following is a feature of network hardware?

    <p>It forms the physical components of a network</p> Signup and view all the answers

    What is the primary reason for regular updates and upgrades to software?

    <p>To improve security and functionality</p> Signup and view all the answers

    What does the 'Y' in the version number format XYZ represent?

    <p>Minor functionality changes</p> Signup and view all the answers

    Which of the following can result from failing to update or upgrade software?

    <p>Reduced functionality due to bugs</p> Signup and view all the answers

    What is the purpose of encryption?

    <p>To ensure only authorized recipients can access data</p> Signup and view all the answers

    What characterizes asymmetric encryption?

    <p>Involves a public key and a private key</p> Signup and view all the answers

    What does a larger key size in encryption signify?

    <p>Stronger encryption</p> Signup and view all the answers

    In symmetric encryption, who knows the private key?

    <p>Only the sender and the receiver</p> Signup and view all the answers

    Which of the following describes a public key in asymmetric encryption?

    <p>Used for encrypting data and is shared openly</p> Signup and view all the answers

    What is the primary advantage of using microwave transmission over cabling?

    <p>It is more efficient in situations where digging tunnels is impractical.</p> Signup and view all the answers

    How does a microwave station primarily collect signals?

    <p>With an Earth-based reflective dish that directs signals to a central collector.</p> Signup and view all the answers

    What is a key requirement for microwave transmission to be successful?

    <p>Clear line of sight without obstructions.</p> Signup and view all the answers

    What function does a communications satellite serve?

    <p>It amplifies and redistributes signals to multiple stations.</p> Signup and view all the answers

    What is the primary goal of a SYN flood attack?

    <p>To overwhelm a network with connection requests</p> Signup and view all the answers

    Which aspect differentiates uplink from downlink in satellite communication?

    <p>Uplink refers to sending signals to a satellite, while downlink is receiving signals back from the satellite.</p> Signup and view all the answers

    Which of the following requirements is NOT typically included for a strong password?

    <p>At least one numeric character</p> Signup and view all the answers

    What makes a distributed denial-of-service (DDoS) attack more challenging to mitigate than a regular DoS attack?

    <p>It originates from multiple sources</p> Signup and view all the answers

    What is a characteristic feature of a mobile communication network?

    <p>The coverage area of towers often overlaps for mobility.</p> Signup and view all the answers

    What might indicate a device is being controlled remotely?

    <p>The mouse cursor moves on its own</p> Signup and view all the answers

    Why might microwave transmission be preferable in large sites?

    <p>Line-of-sight transmission makes physical installation difficult.</p> Signup and view all the answers

    What can occur if access rights are not correctly managed within an organization?

    <p>Greater chances of data tampering</p> Signup and view all the answers

    What can impact the range of a mobile phone tower?

    <p>The geographical landscape and the presence of nearby towers.</p> Signup and view all the answers

    What is home page hijacking designed to achieve?

    <p>Increasing traffic to potential malicious websites</p> Signup and view all the answers

    Which of the following represents a typical method used in brute force attacks?

    <p>Starting with simple character combinations</p> Signup and view all the answers

    Why is it important to keep software up to date?

    <p>To fix bugs and address security threats</p> Signup and view all the answers

    What is the primary function of an Intrusion Detection System (IDS)?

    <p>To monitor network traffic for potential intrusions</p> Signup and view all the answers

    Which type of IDS is installed on individual devices?

    <p>Host Intrusion Detection System (HIDS)</p> Signup and view all the answers

    What might be the consequence of using obvious passwords like 'password'?

    <p>Increased vulnerability to unauthorized access</p> Signup and view all the answers

    How does an Intrusion Prevention System (IPS) differ from an IDS?

    <p>An IPS actively blocks or stops threats without human intervention.</p> Signup and view all the answers

    What is a key characteristic of access rights within a network?

    <p>They are granted to users based on their organizational role</p> Signup and view all the answers

    What is a common outcome of home page hijacking?

    <p>Unwanted advertisements or adware pop-ups</p> Signup and view all the answers

    What do Network Intrusion Detection Systems (NIDS) primarily analyze?

    <p>Data packets against a library of known attacks</p> Signup and view all the answers

    What action can an IPS take in response to a detected threat?

    <p>Delete suspicious data packets</p> Signup and view all the answers

    Study Notes

    Wireless Personal Area Network (WPAN)

    • Common devices found in a WPAN include desktops, laptops, smart TVs, wearables technology, smartphones, and speakers.
    • Communication standards used in WPANs include 802.11(x), Bluetooth, infrared (IR), satellite, and microwave.

    Network Hardware

    • Network interface card (NIC) or wireless adapter: Allows devices to connect to a network.
    • Server: Provides services to other devices on a network.
    • File server: Stores files in a central location for authorized network users to access.
    • Wireless access point: Enables wireless devices to connect to a network.
    • Router: Manages network traffic and directs data to the correct destination.
    • Switch: Connects devices on a network and allows them to communicate directly with each other.
    • Modem: Connects a network to the internet using a telephone or cable line.

    Microwaves

    • Enables high-speed data transmission.
    • Signals are sent between microwave stations, offering an alternative to cabling.
    • Microwave transmission is line-of-sight, meaning that microwaves must travel in a straight line without obstacles.
    • Microwave communication is significantly faster than fiber-optic transmissions.

    Communications Satellites

    • Space stations that receive, amplify, and rebroadcast microwave signals to Earth-based stations.
    • Uplink: Transmission of signals from an Earth-based station to a satellite.
    • Downlink: Transmission of signals from a satellite back to an Earth-based station.

    Mobile Communication Technology

    • Uses mobile phone towers (base stations) to enable communication between mobile devices.
    • Towers often have overlapping coverage areas, allowing users to stay connected while moving.
    • Range of each tower varies based on location and proximity to other towers.

    Network Security Threats

    • Denial-of-service (DoS) attack: Overloads a network with traffic, preventing legitimate users from accessing it.
    • Distributed denial-of-service (DDoS) attack: Similar to DoS, but originates from multiple sources, making it harder to stop or identify the source.
    • Brute force attack: Repeatedly attempts to guess passwords using different combinations of usernames and passwords.

    Security Controls

    • Username and password: A common security control using a unique login for each user.
    • Access rights: Permissions granted to users or applications to allow them to read, write, and delete files on a network.
    • Software updates and upgrades: Crucial for maintaining security and functionality, addressing bugs and security threats.

    Data and Network Protection Strategies

    • Encryption: Encoding data to protect it during transmission and storage, requiring a decryption key for access.
    • Symmetric encryption: Uses the same private key for both encryption and decryption.
    • Asymmetric encryption: Uses a public key for encryption and a private key for decryption.

    Intrusion Detection and Prevention Systems

    • Intrusion detection system (IDS): Monitors network traffic to detect potential intrusions.
    • Host Intrusion detection system (HIDS): Installed on individual devices to monitor data packets sent to or from the device.
    • Network intrusion detection system (NIDS): Installed at key points on a network to monitor network traffic and check packets against a library of known attacks.
    • Intrusion prevention systems (IPS): An extension of an IDS that actively blocks threats without human intervention.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Related Documents

    Description

    This quiz explores the key components and technologies involved in Wireless Personal Area Networks (WPAN). It covers common devices, communication standards, and essential network hardware. Test your knowledge on how these elements work together to enable wireless communication.

    More Like This

    Personal Area Network (PAN) Quiz
    12 questions
    Ad Hoc Networks and Personal Area Networking
    10 questions
    Use Quizgecko on...
    Browser
    Browser