CCNA DISCOVERY 1 - PowerPoint PPT Presentation

1 / 90
About This Presentation
Title:

CCNA DISCOVERY 1

Description:

Link information. 55. What is one of the most common tests for verifying successful data ... WPA generates a new, dynamic key each time a client establishes a ... – PowerPoint PPT presentation

Number of Views:44
Avg rating:3.0/5.0
Slides: 91
Provided by: fst66
Category:
Tags: ccna | discovery | survey

less

Transcript and Presenter's Notes

Title: CCNA DISCOVERY 1


1
CCNA DISCOVERY 1
  • CHAPTER 7
  • WIRELESS TECHNOLOGIES

2
1. What do wireless technologies use to carry
information between devices?
  • Electromagnetic waves

3
2. What are the most common wave lengths used for
public wireless communication?
  • Infrared (IR)
  • Radio Frequency (RF)

4
3. Which wavelength is relatively low energy and
cannot penetrate through walls or other
obstacles?
  • IR

5
4. Which wavelength has the greatest range?
  • RF

6
5. What ranges can be used with very few
restrictions?
  • 900 MHz, 2.4 GHZ, 5 GHz

7
6. What are the ranges with the fewest
restrictions called?
  • Industrial, Scientific, and Medical (ISM)

8
7. What has made Bluetooth technology the
preferred method for connection computer
peripherals?
  • One-to-many communications

9
8. What is one of the main advantages of wireless
technology?
  • The ability to provide anytime, anywhere
    connectivity

10
9. What is a hotspot?
  • The implementation of wireless in public
    locations

11
10. What are the benefits of wireless LAN
technology?
  • Mobility
  • Scalability
  • Flexibility
  • Cost savings
  • Reduced installation time
  • Reliability in harsh environments

12
11. What are the limitations of wireless LAN
technology?
  • Interference
  • Network and data security
  • Technology

13
11. What two techniques have been developed to
help secure wireless transmissions?
  • Encryption and authentication

14
12. What are the three major categories of
wireless networks?
  • WPAN Wireless Personal Area Network
  • WLAN Wireless Local Area Network
  • WWAN Wireless Wide Area Network

15
13. What is the smallest wireless network, which
is used to connect various peripheral devices?
  • WPAN

16
14. What does an access point do?
  • Provides a connection between wireless hosts and
    hosts on an Ethernet wired network

17
15. What technologies does the WWAN use?
  • Code Division Multiple Access (CDMA) or Global
    System for Mobile Communications (GSM)

18
16. What is a good example of a WWAN?
  • Cell phone network

19
17. What do wireless standards ensure?
  • Specify the RF spectrum used, data rates, and how
    the information is transmitted

20
18. What is the main organization responsible for
the creation of wireless technical standards?
  • IEEE

21
19. What IEEE standard governs the WLAN
environment?
  • 802.11

22
20. What are the current standards for the WLAN
environment?
  • 802.11a, 802.11b, 802.11g, 802.11n

23
21. What organization is responsible for testing
wireless LAN devices from different
manufacturers?
  • WI-FI Alliance

24
22. What does the Wi-Fi logo on a device mean?
  • The equipment meets standards and should
    interoperate with other devices of the same
    standard

25
23. What is a STA?
  • A wireless client/station

26
24. What do antennas do?
  • increase output signal strength from a wireless
    device
  • receives wireless signals from other devices

27
25. What is an increase in signal strength from
an antenna known as?
  • gain

28
26. How are antenna classified?
  • According to the way they radiate the signal

29
27. What is the difference between a directional
antenna and an omni-directional antenna?
  • Directional antenna concentrate signal strength
    in one direction omni-directional emit equally
    in all directions

30
28. Which antenna type can achieve greater
transmission distances?
  • directional

31
29. How do you ensure that wireless components
connect to the appropriate WLAN?
  • SSID Service Set Identifier

32
30. What is a case-sensitive, alpha-numeric
string that can be up to 32 characters?
  • SSID

33
31. What is the SSID used for?
  • To tell wireless devices which LAN they belong to
    and with which other devices they can communicate

34
32. What are the two basic forms of WLAN
installations?
  • Ad hoc
  • Infrastructure mode

35
33. What is the simplest form of a wireless
network?
  • Ad-hoc

36
34. How is an ad-hoc network created?
  • Connecting two or more wireless clients together
    in a peer-to-peer network

37
35. What is the mode of wireless communication
most often used in the home and business
environment?
  • Infrastructure

38
36. What controls all communications and ensures
that all STAs have equal access to the media on
infrastructure mode?
  • Access Point

39
37. What is the area covered by a single access
point known as?
  • Basic Service Set (BSS)

40
38. What is the smallest building block of a
WLAN?
  • BSS

41
39. What is an Extended Service Set (ESS)?
  • Multiple access points in separate BSS

42
40. In order to allow movement between the cells
without the loss of signal, how much must BSSs
overlap?
  • 10

43
41. How are the conversations between sender and
receiver controlled?
  • Through channels

44
42. What does Wireless technology use to avoid
collisions?
  • CSMA/CA Carrier Sense Multiple access with
    Collision Avoidance

45
43. What is a CTS (Clear to Send)?
  • A message indicating that the device may transmit
    on the channel

46
44. What is an ACK (acknowledgement)?
  • A transmission control character that confirms a
    transmitted message was received uncorrupted or
    without errors or that the receiving station is
    ready to accept transmissions

47
45. Who receives the ACK?
  • All devices within the BSS

48
46. When should basic configuration tasks be
conducted?
  • Before the access point is connected to a live
    network

49
47. What does the type of mode enabled on the
access point depend on?
  • The type of host connecting to it

50
48. What happens if you select mixed mode?
  • Network performance will decrease

51
49. What must adjacent BSSs use in order to
optimize throughput?
  • Non-overlapping channels

52
50. What is a wireless host?
  • Any device that contains a wireless NIC and
    wireless client software

53
51. What is basic management software that can
control most wireless client configurations?
  • Windows XP wireless client software

54
52. What are some of the features available with
stand-alone wireless utility software?
  • Link information, profiles, site survey

55
53. Is it possible for wireless utility software
and Windows XP client software to manage the
wireless connection at the same time
  • YES or NO

56
54. What feature displays the current signal
strength and quality of the wireless signal?
  • Link information

57
55. What is one of the most common tests for
verifying successful data transmission?
  • Ping

58
56. What does a successful ping tell you?
  • Data transmission is possible

59
57. What is one of the primary benefits of
wireless networking?
  • Ease and convenience of connecting devices

60
58. What is one easy way to gain entry to a
wireless network?
  • Through the network name or SSID

61
59. How can you make the network non-public?
  • Turn off the SSID broadcast feature

62
60. Why should you change the default settings?
  • So that attackers cannot identify and infiltrate
    the network

63
61. What is one way to limit access to your
wireless network?
  • Control exactly which devices can gain access to
    your network

64
62. What is MAC address filtering?
  • Using the MAC address to identify which devices
    are allowed to connect to the wireless network

65
63. What happens if the MAC address is not
located in the database?
  • The device will not be allowed to connect to or
    communicate across the wireless network

66
64. What is authentication?
  • The process of permitting entry to a network
    based on a set of credentials

67
65. What is the most common form of
authentication?
  • The use of a username and password

68
66. What are the three types of wireless
authentication methods?
  • open authentication
  • PSK
  • EAP

69
67. What is open authentication?
  • All clients are able to associate

70
68. What is PSK (pre-shared key) authentication?
  • One-way authentication both the access point and
    client must be configured with the same key or
    secret word

71
69. What is EAP (Extensible Authentication
Protocol)?
  • Two-way authentication as well as user
    authentication

72
70. If MAC address filtering and authentication
are enabled, which occurs first?
  • authentication

73
71. What is encryption?
  • The process of transferring data so that even if
    it is intercepted, it is unusable

74
72. What is WEP (Wired Equivalency Protocol)?
  • An advanced security feature that encrypts
    network traffic as it travels through the air

75
73. How big is the WEP key?
  • 64 or 128 bits

76
74. What is a passphrase?
  • An easy way to remember the word or phrase to
    automatically generate a key

77
75. How is WPA (Wi-Fi Protected Access) different
than WEP?
  • WPA generates a new, dynamic key each time a
    client establishes a connection with the access
    point

78
76. Why is WPA considered more secure than WEP?
  • It is more difficult to crack

79
77. What is traffic filtering?
  • Blocks undesirable traffic from entering or
    leaving the wireless network

80
78. What things should be included when planning
a network installation?
  • The type of wireless standard to be used
  • The most efficient layout of devices
  • An installation and security plan
  • S strategy for backing up and updating the
    firmware for the wireless device

81
79. What are the most common factors to consider
when determining which WLAN standards to use?
  • Bandwidth requirements, coverage areas, existing
    implementation, and cost

82
80. What is the best way to learn end- user
requirements?
  • Ask questions

83
81. Which wireless standard supports a larger
BBS?
  • 802.11 b/g/n

84
82. What is a benefit of a larger BBS?
  • Less equipment and a lower cost of implementation

85
83. What is Total Cost of Ownership (TCO)?
  • The purchase of the equipment as well as
    installation and support costs

86
84. What are some of the more basic security
measures?
  • Change default values for the SSID
  • Disable broadcast SSID
  • Configure MAC address filtering

87
85. What are the two ways to restore factory
defaults?
  • Select restore factory defaults from appropriate
    menu
  • Press and hold the reset button for 30 seconds

88
86. Where is the operating system on most
integrated routers stored?
  • In firmware

89
87. If the update process is interrupted before
completion, what happens to the drive?
  • It may become inoperable

90
88. What is the process of updating firmware on
an integrated router?
  • Determine the version of the currently installed
    firmware
  • Download the updated version of the firmware
  • Select firmware upgrade feature in GUI
Write a Comment
User Comments (0)
About PowerShow.com