This site is 100% ad supported. Please add an exception to adblock for this site.

CWNA

Terms

undefined, object
copy deck
lightning arrestors
Cannot handle a direct lightning strike and will discharge transient current to an Earth ground connection
types of antennas
Grid, Parabolic Dish, Ground plane, Yagi, Patch, Panel, and Omni
security level offered by Point-to-Point Tunneling Protocol (PPTP)
PPTP tunnels and encrypts data, but the original IP connection is still open to attack without a personal firewall in place.
Free Space Path Loss
RF signal amplitude degradation as a propagated wave moves through an empty area
deauthentication frames on OFDM
cause intermittent connectivity of authorized client computers when utilized by attackers and are deployed by WLAN switches and WIPS as a rogue containment tool
Dynamic Rate Switching (DRS)
Changes the modulation and spreading code types used for data transmission
HR/DSSS (802.11b) and ERP (802.11g)
Have a maximum of 3 non-overlapping channels in the 2.4 GHz ISM band
BSS is initiated
when a single access point begins transmitting beacons
Independent Basic Service Set (IBSS) is initiated
When client stations begin transmitting beacons
EAP-TLS and PEAP-EAP-TLS
both support only x.509 certificates as the only client identification credential option
The 802.11-1999 (2003) standard
specifies Open System Authentication and Shared Key Authentication
Transmitter burnout and Decreased or erratic RF signal amplitude
Are problems that occur as a result of a high Voltage Standing Wave Ratio (VSWR)
Radio Frequency Line-of-Sight
When a point-to-point link\'s transmission quality and strength are decreased by Fresnel Zone blockage
How much of the 2.4 GHz ISM band\'s spectrum is used by an IEEE 802.11-compliant FHSS system authorized for use by the FCC (US), IC (Canada), and ETSI (Europe), excluding Spain and France?
Center frequencies between 2.402 GHz and 2.480 GHz (79 center frequencies)
the terminology used by the IEEE 802.11-2007 standard for one or more Basic Service Sets connected by a distribution system
Extended Service Set
Passive scanning in an IBSS
consists only of stations listening to beacons from other stations to gather information about the IBSS.
advantage of using IEEE 802.3-2005, Clause 33 Power over Ethernet (PoE)
Time and cost savings when positioning access points across an indoor enterprise environment.
Which protocol is NOT supported on an HR/DSSS wireless LAN
ISDN
the amount of time spent by a wireless LAN radio on a particular frequency in an FHSS system
Dwell time
result of a DUAL CTS bit existing in the HT Information Element (IE) field of a beacon
Stations will start every transmit opportunity with an RTS frame addressed to the access point
What statements are true regarding the Service Set Identifier (SSID)
maximum length of 32 bytes, and it is case sensitive and WLAN switches have the ability to set the SSID field in the beacon frame to a null value
What information should be included in the RF site survey report?
RF interference source type and location findings and Infrastructure equipment placement suggestions based on optimal coverage patterns within the facility
What does NOT cause degradation to propagating RF waves in 802.11 environments?
Nearby high-power EMF from power lines
What feature is specified in the 802.11i-2004 amendment to support fast roaming of client devices between autonomous access points
Preauthentication with PMK caching
Most 802.11 wireless LAN system components, including transceivers, amplifiers, splitters, cables, attenuators, and antennas have __ ohm impedence
50 ohm impedance
In an Independent Basic Service Set (IBSS), what happens to frames destined for dozing wireless stations?
They are buffered at the transmitting station
Which solutions can be applied to the \'hidden node\' problem with wireless LANs?
Increase output power on client stations and Remove interfering obstacles between clients
What conditions must be met for a Wi-Fi client to take advantage of WMM Power Save?
The client AND access point must meet Wi-Fi CERTIFIED for WMM Power Save specifications and Latency-sensitive applications must support WMM Power Save
a key principle of RF propagation and communication
Signal strength and signal quality do not always go hand-in-hand
mini-PCIe cards can be used for
both client connectivity and protocol analysis. However, this function requires a separate driver to be loaded that initiates an RF Monitor mode on the card.
In what situation would use of 802.11 frame fragmentation increase WLAN throughput by decreasing frame retransmission?
When a source of RF interference is near the ERP-OFDM transmitter or receiver
To qualify as 802.3-2005, Clause 33-compliant
a powered device (PD) must be able to accept power either using alternative A (over data lines) or alternative B (unused pairs). It must be able to reply with a detection signature, and it may optionally reply with a classification signature.
An RTS/CTS handshake is accomplished between which two network entities in a BSS?
Immediate wireless receivers
Distributed Coordination Function (DCF) mode
is synonymous with use of the CSMA/CA medium access protocol and SIFS is used between frames in a fragment burst
Wireless Intrusion Prevention System (WIPS), RF spectrum analyzer and Laptop protocol analyzer
are used to calculate a baseline throughput analysis
Regulatory bodies that govern radio spectrum use for wireless LAN technologies determine what factors in each regulatory domain?
Frequency band licensing, RF Output power limits, Appropriate RF band use
Seeing CF-Poll and CF-ACK frames
means These frames are corrupted, and the protocol analyzer is misinterpreting the remaining frame fragments.
How does a station operating in Point Coordination Function (PCF) mode gain priority over stations not capable of PCF mode?
It acknowledges frames sent to it by the Point Coordinator

Deck Info

38

cutpiece

permalink