Title: CCNA DISCOVERY 1
1CCNA DISCOVERY 1
- CHAPTER 7
- WIRELESS TECHNOLOGIES
21. What do wireless technologies use to carry
information between devices?
32. What are the most common wave lengths used for
public wireless communication?
- Infrared (IR)
- Radio Frequency (RF)
43. Which wavelength is relatively low energy and
cannot penetrate through walls or other
obstacles?
54. Which wavelength has the greatest range?
65. What ranges can be used with very few
restrictions?
76. What are the ranges with the fewest
restrictions called?
- Industrial, Scientific, and Medical (ISM)
87. What has made Bluetooth technology the
preferred method for connection computer
peripherals?
- One-to-many communications
98. What is one of the main advantages of wireless
technology?
- The ability to provide anytime, anywhere
connectivity
109. What is a hotspot?
- The implementation of wireless in public
locations
1110. What are the benefits of wireless LAN
technology?
- Mobility
- Scalability
- Flexibility
- Cost savings
- Reduced installation time
- Reliability in harsh environments
1211. What are the limitations of wireless LAN
technology?
- Interference
- Network and data security
- Technology
1311. What two techniques have been developed to
help secure wireless transmissions?
- Encryption and authentication
1412. What are the three major categories of
wireless networks?
- WPAN Wireless Personal Area Network
- WLAN Wireless Local Area Network
- WWAN Wireless Wide Area Network
1513. What is the smallest wireless network, which
is used to connect various peripheral devices?
1614. What does an access point do?
- Provides a connection between wireless hosts and
hosts on an Ethernet wired network
1715. What technologies does the WWAN use?
- Code Division Multiple Access (CDMA) or Global
System for Mobile Communications (GSM)
1816. What is a good example of a WWAN?
1917. What do wireless standards ensure?
- Specify the RF spectrum used, data rates, and how
the information is transmitted
2018. What is the main organization responsible for
the creation of wireless technical standards?
2119. What IEEE standard governs the WLAN
environment?
2220. What are the current standards for the WLAN
environment?
- 802.11a, 802.11b, 802.11g, 802.11n
2321. What organization is responsible for testing
wireless LAN devices from different
manufacturers?
2422. What does the Wi-Fi logo on a device mean?
- The equipment meets standards and should
interoperate with other devices of the same
standard
2523. What is a STA?
- A wireless client/station
2624. What do antennas do?
- increase output signal strength from a wireless
device - receives wireless signals from other devices
2725. What is an increase in signal strength from
an antenna known as?
2826. How are antenna classified?
- According to the way they radiate the signal
2927. What is the difference between a directional
antenna and an omni-directional antenna?
- Directional antenna concentrate signal strength
in one direction omni-directional emit equally
in all directions
3028. Which antenna type can achieve greater
transmission distances?
3129. How do you ensure that wireless components
connect to the appropriate WLAN?
- SSID Service Set Identifier
3230. What is a case-sensitive, alpha-numeric
string that can be up to 32 characters?
3331. What is the SSID used for?
- To tell wireless devices which LAN they belong to
and with which other devices they can communicate
3432. What are the two basic forms of WLAN
installations?
- Ad hoc
- Infrastructure mode
3533. What is the simplest form of a wireless
network?
3634. How is an ad-hoc network created?
- Connecting two or more wireless clients together
in a peer-to-peer network
3735. What is the mode of wireless communication
most often used in the home and business
environment?
3836. What controls all communications and ensures
that all STAs have equal access to the media on
infrastructure mode?
3937. What is the area covered by a single access
point known as?
4038. What is the smallest building block of a
WLAN?
4139. What is an Extended Service Set (ESS)?
- Multiple access points in separate BSS
4240. In order to allow movement between the cells
without the loss of signal, how much must BSSs
overlap?
4341. How are the conversations between sender and
receiver controlled?
4442. What does Wireless technology use to avoid
collisions?
- CSMA/CA Carrier Sense Multiple access with
Collision Avoidance
4543. What is a CTS (Clear to Send)?
- A message indicating that the device may transmit
on the channel
4644. What is an ACK (acknowledgement)?
- A transmission control character that confirms a
transmitted message was received uncorrupted or
without errors or that the receiving station is
ready to accept transmissions
4745. Who receives the ACK?
- All devices within the BSS
4846. When should basic configuration tasks be
conducted?
- Before the access point is connected to a live
network
4947. What does the type of mode enabled on the
access point depend on?
- The type of host connecting to it
5048. What happens if you select mixed mode?
- Network performance will decrease
5149. What must adjacent BSSs use in order to
optimize throughput?
5250. What is a wireless host?
- Any device that contains a wireless NIC and
wireless client software
5351. What is basic management software that can
control most wireless client configurations?
- Windows XP wireless client software
5452. What are some of the features available with
stand-alone wireless utility software?
- Link information, profiles, site survey
5553. Is it possible for wireless utility software
and Windows XP client software to manage the
wireless connection at the same time
5654. What feature displays the current signal
strength and quality of the wireless signal?
5755. What is one of the most common tests for
verifying successful data transmission?
5856. What does a successful ping tell you?
- Data transmission is possible
5957. What is one of the primary benefits of
wireless networking?
- Ease and convenience of connecting devices
6058. What is one easy way to gain entry to a
wireless network?
- Through the network name or SSID
6159. How can you make the network non-public?
- Turn off the SSID broadcast feature
6260. Why should you change the default settings?
- So that attackers cannot identify and infiltrate
the network
6361. What is one way to limit access to your
wireless network?
- Control exactly which devices can gain access to
your network
6462. What is MAC address filtering?
- Using the MAC address to identify which devices
are allowed to connect to the wireless network
6563. What happens if the MAC address is not
located in the database?
- The device will not be allowed to connect to or
communicate across the wireless network
6664. What is authentication?
- The process of permitting entry to a network
based on a set of credentials
6765. What is the most common form of
authentication?
- The use of a username and password
6866. What are the three types of wireless
authentication methods?
- open authentication
- PSK
- EAP
6967. What is open authentication?
- All clients are able to associate
7068. What is PSK (pre-shared key) authentication?
- One-way authentication both the access point and
client must be configured with the same key or
secret word
7169. What is EAP (Extensible Authentication
Protocol)?
- Two-way authentication as well as user
authentication
7270. If MAC address filtering and authentication
are enabled, which occurs first?
7371. What is encryption?
- The process of transferring data so that even if
it is intercepted, it is unusable
7472. What is WEP (Wired Equivalency Protocol)?
- An advanced security feature that encrypts
network traffic as it travels through the air
7573. How big is the WEP key?
7674. What is a passphrase?
- An easy way to remember the word or phrase to
automatically generate a key
7775. How is WPA (Wi-Fi Protected Access) different
than WEP?
- WPA generates a new, dynamic key each time a
client establishes a connection with the access
point
7876. Why is WPA considered more secure than WEP?
- It is more difficult to crack
7977. What is traffic filtering?
- Blocks undesirable traffic from entering or
leaving the wireless network
8078. What things should be included when planning
a network installation?
- The type of wireless standard to be used
- The most efficient layout of devices
- An installation and security plan
- S strategy for backing up and updating the
firmware for the wireless device
8179. What are the most common factors to consider
when determining which WLAN standards to use?
- Bandwidth requirements, coverage areas, existing
implementation, and cost
8280. What is the best way to learn end- user
requirements?
8381. Which wireless standard supports a larger
BBS?
8482. What is a benefit of a larger BBS?
- Less equipment and a lower cost of implementation
8583. What is Total Cost of Ownership (TCO)?
- The purchase of the equipment as well as
installation and support costs
8684. What are some of the more basic security
measures?
- Change default values for the SSID
- Disable broadcast SSID
- Configure MAC address filtering
8785. What are the two ways to restore factory
defaults?
- Select restore factory defaults from appropriate
menu - Press and hold the reset button for 30 seconds
8886. Where is the operating system on most
integrated routers stored?
8987. If the update process is interrupted before
completion, what happens to the drive?
9088. What is the process of updating firmware on
an integrated router?
- Determine the version of the currently installed
firmware - Download the updated version of the firmware
- Select firmware upgrade feature in GUI