Understanding wireless networks

?
Why are wireless networks more susceptible to interception?
Due to the radio broadcast nature
1 of 15
What is the infrastructure mode?
Wireless clients are authenticated by a WAP
2 of 15
What is the ad-hoc mode?
Point-to-point wireless connection
3 of 15
What is the most well-known wireless device?
Wireless access point
4 of 15
What does a WAP act as?
Router, firewall and IP proxy
5 of 15
How do wireless network adapters allow for?
Connectivity between a desktop computer or laptop and the WAP
6 of 15
What is a wireless repeater used for?
To extend the coverage
7 of 15
What are wireless encryption standards used for?
Secure a wireless network
8 of 15
Why is a wired equivalent privacy unsecure?
Easy to crack
9 of 15
What is the newer version of WPA which offers excellent security?
WPA2
10 of 15
What does a wireless bridge connect?
Different 802.11 standards
11 of 15
Where does RFI interference come from?
AM/FM transmissions and cell phone towers
12 of 15
What mode is being used if the base unit is configured with a SSID?
Infrastructure mode
13 of 15
When the client wants to connect to the WAP how can it be identified?
By the SSID
14 of 15
What are 3 of the 6 best practices for configuring wireless security?
Ensure strongest encryption, change default admin login, disable remote admin etc.
15 of 15

Other cards in this set

Card 2

Front

What is the infrastructure mode?

Back

Wireless clients are authenticated by a WAP

Card 3

Front

What is the ad-hoc mode?

Back

Preview of the front of card 3

Card 4

Front

What is the most well-known wireless device?

Back

Preview of the front of card 4

Card 5

Front

What does a WAP act as?

Back

Preview of the front of card 5
View more cards

Comments

No comments have yet been made

Similar All resources:

See all All resources »See all IT resources »