1/25
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What are the features of a secure and scalable wireless local area network (WLAN)?
A secure and scalable WLAN should accommodate growth, provide continuous intrusion monitoring, strong encryption, scalable authentication, and segmented network design.
What is the purpose of continuous intrusion monitoring in a WLAN?
To detect and contain attacks through tools like wireless intrusion detection systems (WIDS) and wireless intrusion prevention systems (WIPS).
What types of traffic filtering can be implemented in a WLAN?
Traffic filtering can include address filtering, data filtering, and protocol filtering.
What is the weakest WLAN encryption option?
Wired Equivalent Privacy (WEP) is the weakest encryption option.
Which encryption method is recommended for secure WLANs?
Wi-Fi Protected Access 2 (WPA2) is recommended for secure WLANs.
What is scalable authentication in the context of WLAN?
Scalable authentication refers to strong authentication methods that can grow, such as WPA Enterprise and WPA2 Enterprise models using IEEE 802.1x.
What is the role of segmented network design in WLAN?
Segmented network design divides the network into smaller units to enhance security and manageability.
What does fast handoff refer to in WLAN technology?
Fast handoff allows a wireless client to determine the quality of service and security at different access points before transitioning.
What basic tasks are involved in WLAN operational support?
Basic tasks include monitoring, configuration management, and user training.
What limitations do monitoring tools for wired networks have compared to WLAN monitoring tools?
Wired monitoring tools do not detect RF interference, jamming, or unauthorized access points.
What is the significance of education and training in WLAN security?
Education and training ensure users understand their role in security and the importance of protecting information.
What is WiMAX and what standard is it based on?
WiMAX (Worldwide Interoperability for Microwave Access) is based on the IEEE 802.16 standard.
What are the two categories of WiMAX?
Fixed WiMAX and Mobile WiMAX.
What is the maximum service range of Fixed WiMAX?
Fixed WiMAX provides up to 50 kilometers (31 miles) of service range.
What are the throughput rates for 3G networks?
3G networks have throughput rates averaging between 400 Kbps and 700 Kbps.
What is the difference between 4G and 4G LTE?
4G is an extension of 3G focusing on data and multimedia, while 4G LTE is a specific technology providing faster mobile internet.
What is the expected download speed of 5G networks?
5G networks are expected to provide download speeds up to 10 gigabits per second (Gbit/s).
What is the main advantage of 5G technology?
The main advantage is greater bandwidth, allowing for higher download speeds.
What is the role of RADIUS in WLAN authentication?
RADIUS (Remote Authentication Dial-In User Service) is used for scalable wireless authentication solutions.
What is the importance of user awareness in WLAN security?
User awareness is crucial for ensuring that users understand their responsibilities in protecting the network.
What is the maximum speed of 2.5G networks?
2.5G networks operate at a maximum speed of 384 Kbps.
What are the main components of WLAN operational support?
Monitoring, configuration management, and education and training are the main components.
What challenges are associated with security education and training?
One challenge is understanding how individuals learn and tailoring training accordingly.
What is the significance of the IEEE 802.11r standard?
IEEE 802.11r specifies how communications occur between access points to support roaming users.
What is the role of network address translation (NAT) in segmented network design?
NAT helps in managing traffic and enhancing security by hiding internal IP addresses.
What types of changes are controlled by configuration management in WLANs?
Configuration management controls changes related to applications, coverage area, RF channels, security, and transmit power.