ccna discovery 1 module 7 – wireless technologies

100
CCNA DISCOVERY 1 • MODULE 7 – WIRELESS TECHNOLOGIES

Upload: theresa-edwards

Post on 24-Dec-2015

238 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

CCNA DISCOVERY 1

• MODULE 7 – WIRELESS TECHNOLOGIES

Page 2: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

1. What do wireless technologies use to carry

information between devices?

• Electromagnetic waves

Page 3: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

2. What are the most common wave lengths used for public

wireless communication?

• Infrared (IR)

• Radio Frequency (RF)

Page 4: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

3. Which wavelength is relatively low energy and cannot penetrate through walls or other

obstacles?• IR

Page 5: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

4. Which wavelength has the greatest range?

• RF

Page 6: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

5. What ranges can be used with very few restrictions?

• 900 MHz, 2.4 GHZ, 5 GHz

Page 7: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

6. What are the ranges with the fewest restrictions called?

• Industrial, Scientific, and Medical (ISM)

Page 8: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7. What has made Bluetooth technology the preferred

method for connection computer peripherals?

• One-to-many communications

Page 9: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7.1.1.4 Activity

Page 10: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

8. What is one of the main advantages of wireless

technology?

• The ability to provide anytime, anywhere connectivity

Page 11: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

9. What is a hotspot?

• The implementation of wireless in public locations

Page 12: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

10. What are the benefits of wireless LAN technology?

• Mobility

• Scalability

• Flexibility

• cost savings

• reduce installation time

• reliability in harsh environments

Page 13: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

11. What are the limitations of wireless LAN technology?

• Interference

• network and data security

• technology

Page 14: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

12. What two techniques have been developed to help secure wireless transmissions?

• Encryption and authentication

Page 15: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

13. What are the three major categories of wireless

networks?

• WPAN – Wireless Personal Area Network

• WLAN – Wireless Local Area Network

• WWAN – Wireless Wide Area Network

Page 16: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

14. What is the smallest wireless network, which is used

to connect various peripheral devices?

• WPAN

Page 17: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

15. What does an access point do?

• Provides a connection between wireless hosts and hosts on an Ethernet wired network

Page 18: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

16. What technologies does the WWAN use?

• Code Division Multiple Access (CDMA) or Global System for Mobile Communications (GSM)

Page 19: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

17. What is a good example of a WWAN?

• Cell phone network

Page 20: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7.1.3.3 Activity

Page 21: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

18. What do wireless standards ensure?

• Specify the RF spectrum used, data rates, and how the information is transmitted

Page 22: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

19. What is the main organization responsible for the

creation of wireless technical standards?

• IEEE

Page 23: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

20. What IEEE standard governs the WLAN environment?

• 802.11

Page 24: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

21. What are the current standards for the WLAN

environment?

• 802.11a, 802.11b, 802.11g, 802.11n

Page 25: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

22. What organization is responsible for testing wireless

LAN devices from different manufacturers?

• WI-FI Alliance

Page 26: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

23. What does the Wi-Fi logo on a device mean?

• The equipment meets standards and should interoperate with other devices of the same standard

Page 27: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

24. Complete the Common IEEE WLAN Standards Chart

Page 28: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

25. What is a STA?

• A wireless client/station

Page 29: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

26. What do antennas do?

• increase output signal strength from a wireless device

• receives wireless signals from other devices

Page 30: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

27. What is an increase in signal strength from an antenna known

as?

• gain

Page 31: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

28. How are antenna classified?

• According to the way they radiate the signal

Page 32: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

29. What is the difference between a directional antenna

and an omni-directional antenna?

• Directional antenna concentrate signal strength in one direction; omni-directional emit equally in all directions

Page 33: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

30. Which antenna type can achieve greater transmission

distances?

• directional

Page 34: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7.2.2.3 Activity

Page 35: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

31. How do you ensure that wireless components connect to

the appropriate WLAN?• SSID – Service Set Identifier

Page 36: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

32. What is a case-sensitive, alpha-numeric string that can be

up to 32 characters?

• SSID

Page 37: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

33. What is the SSID used for?

• To tell wireless devices which LAN they belong to and with which other devices they can communicate

Page 38: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

34. What are the two basic forms of WLAN installations?

• Ad hoc

• Infrastructure mode

Page 39: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

35. What is the simplest form of a wireless network?

• Ad-hoc

Page 40: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

36. How is an ad-hoc network created?

• Connecting two or more wireless clients together in a peer-to-peer network

Page 41: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

37. What is the mode of wireless communication most often used in the home and

business environment?

• Infrastructure

Page 42: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

38. What controls all communications and ensures

that all STAs have equal access to the media on infrastructure

mode?

• Access Point

Page 43: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

39. What is the area covered by a single access point known as?

• Basic Service Set (BSS)

Page 44: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

40. What is the smallest building block of a WLAN?

• BSS

Page 45: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

41. What is an Extended Service Set (ESS)?

• Multiple access points in separate BSS

Page 46: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

42. In order to allow movement between the cells without the loss of signal, how much must

BSS’s overlap?

• 10%

Page 47: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7.2.3.4 Activity

Page 48: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

43. How are the conversations between sender and receiver

controlled?

• Through channels

Page 49: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

44. What does Wireless technology use to avoid

collisions?

• CSMA/CA – Carrier Sense Multiple access with Collision Avoidance

Page 50: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

45. What is a CTS (Clear to Send)?

• A message indicating that the device may transmit on the channel

Page 51: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

46. What is an ACK (acknowledgement)?

• A transmission control character that confirms a transmitted message was received uncorrupted or without errors or that the receiving station is ready to accept transmissions

Page 52: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

47. Who receives the ACK?

• All devices within the BSS

Page 53: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7.2.4.3 Activity

Page 54: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

48. When should basic configuration tasks be

conducted?

• Before the access point is connected to a live network

Page 55: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

49. What does the type of mode enabled on the access point

depend on?

• The type of host connecting to it

Page 56: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

50. What happens if you select mixed mode?

• Network performance will decrease

Page 57: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

51. What must adjacent BSSs use in order to optimize

throughput?

• Non-overlapping channels

Page 58: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

52. What is a wireless host?

• Any device that contains a wireless NIC and wireless client software

Page 59: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

53. What is basic management software that can control most wireless client configurations?

• Windows XP wireless client software

Page 60: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

54. What are some of the features available with stand-

alone wireless utility software?

• Link information, profiles, site survey

Page 61: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

55. Is it possible for wireless utility software and Windows XP

client software to manage the wireless connection at the same

time

• YES or NO

Page 62: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

56. What feature displays the current signal strength and

quality of the wireless signal?

• Link information

Page 63: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

57. What is one of the most common tests for verifying

successful data transmission?

• Ping

Page 64: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

58. What does a successful ping tell you?

• Data transmission is possible

Page 65: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

59. What is one of the primary benefits of wireless networking?

• Ease and convenience of connecting devices

Page 66: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

60. What is one easy way to gain entry to a wireless

network?

• Through the network name or SSID

Page 67: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

61. How can you make the network non-public?

• Turn off the SSID broadcast feature

Page 68: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

62. Why should you change the default settings?

• So that attackers cannot identify and infiltrate the network

Page 69: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

63. What is one way to limit access to your wireless

network?

• Control exactly which devices can gain access to your network

Page 70: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

64. What is MAC address filtering?

• Using the MAC address to identify which devices are allowed to connect to the wireless network

Page 71: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

65. What happens if the MAC address is not located in the

database?

• The device will not be allowed to connect to or communicate across the wireless network

Page 72: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

66. What is authentication?

• The process of permitting entry to a network based on a set of credentials

Page 73: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

67. What is the most common form of authentication?

• The use of a username and password

Page 74: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

68. What are the three types of wireless authentication methods?

• open authentication

• PSK

• EAP

Page 75: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

69. What is open authentication?

• All clients are able to associate

Page 76: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

70. What is PSK (pre-shared key) authentication?

• One-way authentication both the access point and client must be configured with the same key or secret word

Page 77: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

71. What is EAP (Extensible Authentication Protocol)?

• Two-way authentication as well as user authentication

Page 78: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

72. If MAC address filtering and authentication are enabled,

which occurs first?

• authentication

Page 79: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

73. What is encryption?

• The process of transferring data so that even if it is intercepted, it is unusable

Page 80: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

74. What is WEP (Wired Equivalency Protocol)?

• An advanced security feature that encrypts network traffic as it travels through the air

Page 81: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

75. How big is the WEP key?

• 64 or 128 bits

Page 82: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

76. What is a passphrase?

• An easy way to remember the word or phrase to automatically generate a key

Page 83: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

77. How is WPA (Wi-Fi Protected Access) different than

WEP?

• WPA generates a new, dynamic key each time a client establishes a connection with the access point

Page 84: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

78. Why is WPA considered more secure than WEP?

• It is more difficult to crack

Page 85: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7.3.4.3 Activity

Page 86: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

79. What is traffic filtering?

• Blocks undesirable traffic from entering or leaving the wireless network

Page 87: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

80. What things should be included when planning a network

installation?

• the type of wireless standard to be used

• the most efficient layout of devices

• an installation and security plan

• a strategy for backing up and updating the firmware for the wireless device

Page 88: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

81. What are the most common factors to consider when determining which WLAN

standards to use?

• Bandwidth requirements, coverage areas, existing implementation, and cost

Page 89: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

82. What is the best way to learn end- user requirements?

• Ask questions

Page 90: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

83. Which wireless standard supports a larger BBS?

• 802.11 b/g/n

Page 91: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

84. What is a benefit of a larger BBS?

• Less equipment and a lower cost of implementation

Page 92: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

85. What is Total Cost of Ownership (TCO)?

• The purchase of the equipment as well as installation and support costs

Page 93: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

86. What are some of the more basic security measures?

• change default values for the SSID

• disable broadcast SSID

• configure MAC address filtering

Page 94: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

87. What are the two ways to restore factory defaults?

• select restore factory defaults from appropriate menu

• press and hold the reset button for 30 seconds

Page 95: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7.4.3.2 Activity

Page 96: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

88. Where is the operating system on most integrated

routers stored?

• In firmware

Page 97: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

89. If the update process is interrupted before completion,

what happens to the drive?

• It may become inoperable

Page 98: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

90. What is the process of updating firmware on an integrated router?

• determine the version of the currently installed firmware

• download the updated version of the firmware

• select firmware upgrade feature in GUI

Page 99: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES

7.4.4.2 Activity

Page 100: CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES