Mod 7 Study Guide

advertisement
____________________________
Name
____________________________
Date
CCNA DISCOVERY 1
MODULE 7 – WIRELESS TECHNOLOGIES
STUDY GUIDE
7.1.1 Client/Server Relationships
1.
What do wireless technologies
use to carry information between
devices?
2.
What are the most common wave
lengths used for public wireless
communication?
3.
Which wavelength is relatively
low energy and cannot penetrate
through walls or other obstacles?
4.
Which wavelength has the
greatest range?
5.
What ranges can be used with
very few restrictions?
6.
What are the ranges with the
fewest restrictions called?
7.
What has made Bluetooth
technology the preferred method
for connection computer
peripherals?
7.1.1.4 Activity
7.1.2 Benefits and Limitations of Wireless Technology
8.
What is one of the main
advantages of wireless
technology?
9.
What is a hotspot?
10.
What are the benefits of wireless
LAN technology?
11.
What are the limitations of
wireless LAN technology?
CCNA Discovery 1 Mod 7 Study Guide
Page 1
Electromagnetic waves
Infrared (IR)
Radio Frequency (RF)
IR
RF
900 MHz, 2.4 GHZ, 5 GHz
Industrial, Scientific, and
Medical (ISM)
One-to-many communications
The ability to provide anytime,
anywhere connectivity
The implementation of wireless
in public locations
1. mobility
2. scalability
3. flexibility
4. cost savings
5. reduce installation time
6. reliability in harsh
environments
1. interference
2. network and data security
3. technology
12.
What two techniques have been
Encryption and authentication
developed to help secure wireless
transmissions?
7.1.3 Types of Wireless Networks and Their Boundaries
13.
What are the three major
WPAN – Wireless Personal Area
categories of wireless networks?
Network
WLAN – Wireless Local Area
Network
WWAN – Wireless Wide Area
Network
14.
What is the smallest wireless
WPAN
network, which is used to connect
various peripheral devices?
15.
What does an access point do?
Provides a connection between
wireless hosts and hosts on an
Ethernet wired network
16.
What technologies does the
Code Division Multiple Access
WWAN use?
(CDMA) or Global System for
Mobile Communications (GSM)
17.
What is a good example of a
Cell phone network
WWAN?
7.1.3.3 Activity
7.2.1 Wireless LAN Standards
18.
What do wireless standards
Specify the RF spectrum used,
ensure?
data rates, and how the
information is transmitted
19.
What is the main organization
IEEE
responsible for the creation of
wireless technical standards?
20.
What IEEE standard governs the
802.11
WLAN environment?
21.
What are the current standards for 802.11a, 802.11b, 802.11g,
the WLAN environment?
802.11n
22.
What organization is responsible
WI-FI Alliance
for testing wireless LAN devices
from different manufacturers?
23.
What does the Wi-Fi logo on a
The equipment meets standards
device mean?
and should interoperate with
other devices of the same
standard
7.2.1.2
24.
Complete the Common IEEE
WLAN Standards Chart
7.2.2 Wireless LAN Components
25.
What is a STA?
A wireless client/station
26.
What do antennas do?
1. increase output signal
CCNA Discovery 1 Mod 7 Study Guide
Page 2
27.
28.
What is an increase in signal
strength from an antenna known
as?
How are antenna classified?
29.
What is the difference between a
directional antenna and an omnidirectional antenna?
30.
Which antenna type can achieve
greater transmission distances?
7.2.2.3 Activity
7.2.3 WLANS and the SSID
31.
How do you ensure that wireless
components connect to the
appropriate WLAN?
32.
What is a case-sensitive, alphanumeric string that can be up to
32 characters?
33.
What is the SSID used for?
strength from a wireless
device
2. receives wireless signals
from other devices
gain
According to the way they
radiate the signal
Directional antenna concentrate
signal strength in one direction;
omni-directional emit equally in
all directions
directional
SSID – Service Set Identifier
SSID
To tell wireless devices which
LAN they belong to and with
which other devices they can
communicate
7.2.3
34.
35.
36.
37.
38.
39.
40.
What are the two basic forms of
WLAN installations?
What is the simplest form of a
wireless network?
How is an ad-hoc network
created?
Ad hoc
Infrastructure mode
Ad-hoc
Connecting two or more
wireless clients together in a
peer-to-peer network
Infrastructure
What is the mode of wireless
communication most often used
in the home and business
environment?
What controls all communications Access Point
and ensures that all STAs have
equal access to the media on
infrastructure mode?
What is the area covered by a
Basic Service Set (BSS)
single access point known as?
What is the smallest building
BSS
CCNA Discovery 1 Mod 7 Study Guide
Page 3
41.
42.
block of a WLAN?
What is an Extended Service Set
(ESS)?
In order to allow movement
between the cells without the loss
of signal, how much must BSS’s
overlap?
7.2.3.4 Activity
7.2.4 Wireless Channels
43.
How are the conversations
between sender and receiver
controlled?
44.
What does Wireless technology
use to avoid collisions?
45.
What is a CTS (Clear to Send)?
46.
What is an ACK
(acknowledgement)?
47.
Who receives the ACK?
7.2.4.3 Activity
7.2.5 Configuring the Access Point
48.
When should basic configuration
tasks be conducted?
49.
What does the type of mode
enabled on the access point
depend on?
50.
What happens if you select mixed
mode?
51.
What must adjacent BSSs use in
order to optimize throughput?
7.2.5.3 Lab Activity
7.2.6 Configuring the Wireless Client
52.
What is a wireless host?
53.
54.
What is basic management
software that can control most
wireless client configurations?
What are some of the features
available with stand-alone
CCNA Discovery 1 Mod 7 Study Guide
Page 4
Multiple access points in
separate BSS
10%
Through channels
CSMA/CA – Carrier Sense
Multiple access with Collision
Avoidance
A message indicating that the
device may transmit on the
channel
A transmission control character
that confirms a transmitted
message was received
uncorrupted or without errors or
that the receiving station is ready
to accept transmissions
All devices within the BSS
Before the access point is
connected to a live network
The type of host connecting to it
Network performance will
decrease
Non-overlapping channels
Any device that contains a
wireless NIC and wireless client
software
Windows XP wireless client
software
Link information, profiles,
site survey
wireless utility software?
55.
Is it possible for wireless utility
software and Windows XP client
software to manage the wireless
connection at the same time
56.
What feature displays the current
signal strength and quality of the
wireless signal?
57.
What is one of the most common
tests for verifying successful data
transmission?
58.
What does a successful ping tell
you?
7.2.6.4 Lab Activity
7.3.1 Why People Attach WLANS
59.
What is one of the primary
benefits of wireless networking?
60.
What is one easy way to gain
entry to a wireless network?
61.
How can you make the network
non-public?
62.
Why should you change the
default settings?
7.3.2 Limiting Access to a WLAN
63.
What is one way to limit access to
your wireless network?
64.
What is MAC address filtering?
65.
What happens if the MAC
address is not located in the
database?
7.3.3 Authentication of a WLAN
66.
What is authentication?
67.
68.
69.
70.
What is the most common form
of authentication?
What are the three types of
wireless authentication methods?
What is open authentication?
What is PSK (pre-shared key)
authentication?
CCNA Discovery 1 Mod 7 Study Guide
Page 5
YES or NO
Link information
Ping
Data transmission is possible
Ease and convenience of
connecting devices
Through the network name or
SSID
Turn off the SSID broadcast
feature
So that attackers cannot identify
and infiltrate the network
Control exactly which devices
can gain access to your network
Using the MAC address to
identify which devices are
allowed to connect to the
wireless network
The device will not be allowed to
connect to or communicate
across the wireless network
The process of permitting entry
to a network based on a set of
credentials
The use of a username and
password
1. open authentication
2. PSK
3. EAP
All clients are able to associate
One-way authentication both the
access point and client must be
configured with the same key or
71.
What is EAP (Extensible
Authentication Protocol)?
72.
If MAC address filtering and
authentication are enabled, which
occurs first?
7.3.4 Encryption of a WLAN
73.
What is encryption?
74.
75.
76.
77.
78.
The process of transferring data
so that even if it is intercepted, it
is unusable
What is WEP (Wired Equivalency An advanced security feature that
Protocol)?
encrypts network traffic as it
travels through the air
How big is the WEP key?
64 or 128 bits
What is a passphrase?
An easy way to remember the
word or phrase to automatically
generate a key
How is WPA (Wi-Fi Protected
WPA generates a new, dynamic
Access) different than WEP?
key each time a client establishes
a connection with the access
point
Why is WPA considered more
It is more difficult to crack
secure than WEP?
7.3.4.3 Activity
7.3.5 Traffic Filtering on a WLAN
79.
What is traffic filtering?
7.3.5.2 Lab Activity
7.4. Configuring an Integrated AP & Wireless Client
7.4.1 Planning the WLAN
80.
What things should be included
when planning a network
installation?
81.
82.
secret work
Two-way authentication as well
as user authentication
authentication
What are the most common
factors to consider when
determining which WLAN
standards to use?
What is the best way to learn end-
CCNA Discovery 1 Mod 7 Study Guide
Page 6
Blocks undesirable traffic from
entering or leaving the wireless
network
1. the type of wireless
standard to be used
2. the most efficient layout
of devices
3. an installation and
security plan
4. a strategy for backing up
and updating the
firmware for the wireless
device
Bandwidth requirements,
coverage areas, existing
implementation, and cost
Ask questions
user requirements?
83.
Which wireless standard supports 802.11 b/g/n
a larger BBS?
84.
What is a benefit of a larger BBS? Less equipment and a lower cost
of implementation
85.
What is Total Cost of Ownership The purchase of the equipment as
(TCO)?
well as installation and support
cots
7.4.2 Installing and Security The Access Point
86.
What are some of the more basic
1. change default values for
security measures?
the SSID
2. disable broadcast SSID
3. configure MAC address
filtering
7.4.3 Backing Up and Restoring Configuration Files
87.
What are the two ways to restore
1. select restore factory
factory defaults?
defaults from appropriate
menu
2. press and hold the reset
button for 30 seconds
7.4.3.2 Activity
7.4.4 Updating the Firmware
88.
Where is the operating system on In firmware
most integrated routers stored?
89.
If the update process is
It may become inoperable
interrupted before completion,
what happens to the drive?
90.
What is the process of updating
1. determine the version of
firmware on an integrated router?
the currently installed
firmware
2. download the updated
version fot he firmware
3. select firmware upgrade
feature in GUI
7.4.4.2 Activity
7.6.1.1 Quiz
CCNA Discovery 1 Mod 7 Study Guide
Page 7
Download