1/22
Key terms and vocabulary regarding wireless networking, security protocols, and authentication methods.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Advanced Encryption Standard (AES)
A strong encryption method used in WPA2 and WPA3 wireless security protocols to protect data from unauthorized access.
Bluetooth
A short-range wireless communication technology used for creating personal area networks (PANs) to connect devices like headphones, keyboards, and phones.
Channel bonding
A process of combining multiple wireless channels to increase bandwidth and performance, typically used in the 5ext−GHz and 6ext−GHz frequency bands.
Kerberos
A secure, ticket-based authentication protocol used in Windows-based environments to access multiple services without re-entering credentials.
Multiple Input, Multiple Output (MIMO)
A wireless technology that uses multiple antennas to send and receive more data simultaneously, improving performance and range.
Multi-User MIMO (MU-MIMO)
An enhancement to MIMO that allows communication with multiple devices at once, improving overall network efficiency.
Near Field Communication (NFC)
A very short-range wireless technology used for secure transactions and device pairing, such as contactless payments.
Orthogonal Frequency Division Multiple Access (OFDMA)
A wireless feature in Wi-Fi 6 (802.11ax) that allows simultaneous transmission to multiple devices for better efficiency.
Personal area network (PAN)
A small-scale network that connects devices within an individual's workspace, often using Bluetooth.
Radio Frequency Identification (RFID)
A technology that uses radio waves to identify and track objects via tags and scanners, often used in inventory and access control systems.
Remote Authentication Dial-In User Service (RADIUS)
An authentication protocol used in enterprise networks to verify user credentials and provide centralized access control.
Service Set Identifier (SSID)
The name assigned to a Wi-Fi network that is broadcast by a wireless access point and used by clients to identify and connect to the network.
Temporal Key Integrity Protocol (TKIP)
An older encryption protocol used in WEP and WPA, now considered insecure and deprecated.
Terminal Access Controller Access-Control System Plus (TACACS+)
A protocol used to control access to network devices with detailed authentication, authorization, and accounting features.
Wi-Fi Enterprise mode
A wireless security configuration that uses a RADIUS server for centralized authentication and access control.
Wi-Fi Personal mode
A wireless security configuration using a pre-shared key, suitable for home and small networks.
Wi-Fi Protected Access (WPA)
A wireless security protocol that replaced WEP but is also now considered insecure and deprecated.
Wi-Fi Protected Access 2 (WPA2)
A secure wireless security protocol that uses AES encryption and supports Personal and Enterprise modes.
Wi-Fi Protected Access 3 (WPA3)
The latest and most secure wireless security protocol, offering stronger encryption and better protection against unauthorized access.
Wired Equivalent Privacy (WEP)
An early wireless security protocol that is now considered insecure and deprecated.
Wireless channel
A defined frequency range used to transmit data in a wireless network, helping reduce interference.
Wireless frequency bands
The different radio bands used for wireless networks, such as 2.4extGHz, 5extGHz, and 6extGHz, each with distinct range and speed characteristics.
Wireless standards (802.11a/b/g/n/ac/ax)
A family of IEEE standards defining wireless network capabilities including speed, frequency band, and features.