Wireless Network Technology: Key Concepts and Security

Classified in Computers

Written at on English with a size of 3.85 KB.

1. Why Can IEEE 802.11 Transmit Further Than Bluetooth?

IEEE 802.11 (Wi-Fi) has a higher power output than Bluetooth.

2. Three Advantages of Wireless Over Wired Technology

  • Anytime, anywhere connectivity
  • Easy and inexpensive to install
  • Ease of adding additional devices

3. Two Benefits of Wireless Networks Over Wired Networks

  • Mobility
  • Reduced installation time

4. Factors Affecting the Number of Access Points Needed

Three factors that affect the number of access points needed for wireless connectivity are:

  • The size of the building
  • The number of solid interior walls in the building
  • The presence of microwave ovens in various offices

5. Why is Security Important in Wireless Networks?

Security is crucial because wireless networks broadcast data over a medium that allows easy access.

6. What Does the Wi-Fi Logo Indicate?

The Wi-Fi logo indicates that the device is interoperable with other devices that also carry the Wi-Fi logo.

7. Wireless Bridges

Wireless bridges connect two networks with a wireless link.

8. What is an STA?

In a WLAN, an STA is commonly referred to as a wireless client.

9. Ad-Hoc Wireless Networks

An ad-hoc wireless network is created by connecting wireless clients in a peer-to-peer network.

10. Mixed Network Option on a Linksys Router

The "mixed" network option on a Linksys integrated router means that the router supports 802.11b, 802.11g, and 802.11n devices.

11. SSID Broadcasting on a Linksys Router

On a Linksys wireless router, the configuration option that allows the presence of the access point to be known to nearby clients is SSID Broadcasting.

12. Service Set Identifier (SSID)

Two true statements about an SSID:

  • It indicates the WLAN to which a device belongs.
  • All wireless devices on the same WLAN must have the same SSID.

13. Wireless Network Security

Two statements that characterize wireless network security:

  • With SSID broadcast disabled, an attacker must know the SSID to connect.
  • Using the default IP address on an access point makes hacking easier.

14. Default Authentication Type for Access Points

The default authentication type for access points is Open.

15. Open Authentication

When open authentication is enabled on an access point, it does not require authentication.

16. Authentication Methods for Access Points

Two authentication methods that an access point could use are:

  • EAP
  • Pre-shared keys

17. Open Authentication vs. Pre-Shared Keys

Pre-shared keys require an encrypted secret word, while open authentication does not.

18. Wireless Data Encryption

The term that describes the encoding of wireless data to prevent unauthorized access is encryption.

19. Access Point Feature for Data Control

The access point feature that allows a network administrator to define what data can enter the wireless network is traffic filtering.

20. WEP Key Lengths

The two WEP key lengths are:

  • 64-bit
  • 128-bit

21. WEP and EAP in Wireless Networks

WEP is used to encrypt, and EAP is used to authenticate users on wireless networks.

Entradas relacionadas: