Download Ch10

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Signals intelligence wikipedia , lookup

Mobile device forensics wikipedia , lookup

Carrier IQ wikipedia , lookup

Distributed firewall wikipedia , lookup

Mobile security wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Wireless security wikipedia , lookup

Network tap wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Transcript
Ch. 10 Review Questions
1. Monitoring a wireless network can be performed with two different sets of tools,
specific WLAN utilities and _____ tools.
a. standard networking
b. address resolution protocol
c. encryption
d. Device Interrupt Driver (DID)
2. Most operating systems have basic tools for _____.
a. speed and data modeling
b. packet and frame traversal
c. writing firmware updates
d. monitoring the WLAN
3. Windows Wireless Network Connection Status window shows each of the
following except ________,
a. SSID
b. relative signal strength
c. number of bytes sent and received
d. authentication challenge text
4. Each of the following is data that many enterprise-level access points can provide
except
a. event log
b. wireless transmission statistics
c. intercepted packets
d. Ethernet connection statistics
5. Each of the following is a limitation of data collected from an access point except
a. cannot retain data
b. size of packets
c. labor-intensive
d. timeliness of data
6. Wireless networks require more management than wired networks. True or
False?
7. The Simple Network Management Protocol (SNMP) is a protocol that allows
computers and network equipment to gather data about network performance.
True or False?
8. The SNMP management station communicates with the Management Information
Base (MIB) on each network device and collects and stores the data in software
agents. True or False?
9. Whenever the network exceeds a predefined limit, it triggers an alert message,
called an SNMP trap, which is sent to the management station. True or False?
10. Electrically-Erasable Programmable Read-Only Memory can be programmed and
erased multiple times electrically but can only be read 1,024 times. True or False?
11. It is virtually impossible to manage a wireless network without the ability to
_____ what is happening on the network. monitor
12. _____ is an SNMP-based tool that is used to monitor LANs that are connected
through a wide area network (WAN). Remote Network Monitoring (RMON)
13. _____ is software that is embedded into hardware in order to control the device.
Firmware
14. Once an AP’s firmware has been upgraded there are several settings that may
need to be adjusted and this is known as _____. RF site tuning
15. A(n) _____ is a rough calculation of all known elements of the link to determine
if the signal will have the proper strength when it reaches the other end of the
link. link budget
16. Explain how Simple Network Management Protocol collects data and the type of
data that is gathered.
Software agents are loaded onto each network device that will be managed using
SNMP. Each agent monitors network traffic and stores that information in its
management information base (MIB). In addition, a computer with the SNMP
management software, known as the SNMP management station, must also be on
the network. The SNMP management station communicates with the software
agents on each network device and collects the data stored in the MIBs. It then
combines all of the data and produces statistics about the network. This data
includes transmission or connectivity errors, the number of bytes or data packets
sent, and information on IP activity and addressing.
17. Describe a rod antenna and its RF patter.
The type of antenna that is most typically used on a wireless LAN is a rod antenna.
A rod antenna for an access point looks like a slim rod approximately half an inch
in diameter and may vary in length from four to six inches. Rod antennas are omnidirectional (also called dipole antennas). The radiation pattern of the signal is a full
360 degrees around the antenna, so a rod antenna mounted vertically will transmit
in 360 degrees to the horizon. This means that the transmission pattern of a rod
antenna is focused along the horizontal plane. Increasing the length of the rod
creates a “tighter” the 360 degree beam, which means that a stronger signal is sent
along the horizon but devices that are vertically above or below the antenna receive
less of a signal.
18. What is a sectorized antenna?
A sectorized antenna “cuts” the standard 360 degree pattern into four quarters.
Each quarter has its own transmitter and antenna. In this way the radiation
pattern can be specialized for North, South, East, and West transmissions, with
additional power given to different quarters as necessary.
19. Describe the two types of RF amplifers.
An RF amplifier is a device that will amplify or increase the amplitude of an RF
signal. The positive difference in amplitude between two signals is
known as gain. Although gain can occur unintentionally when an RF
signal bounces off an object and combines with the original
signal to amplify it, more often it is necessary to “boost” a
signal to compensate for loss of power. This loss may be the
result of the distance between the AP and the wireless device or
it could be due to the length of cable from a wireless device to
its antenna (as when an external antenna is attached to an AP. RF
amplifiers can be one of two types. A unidirectional amplifier increases the RF
signal level before it is injected into the transmitting antenna. A bi-directional
amplifier boosts the RF signal before it is injected into the device that contains the
antenna. For a WLAN this would be the access point or wireless device. Most RF
amplifiers for WLANs are bi-directional.
20. What is a wireless security policy and why is it important?
A security policy is a document or series of documents that clearly defines the
defense mechanisms an organization will employ to keep information secure. It also
outlines how the organization will respond to attacks as well as the duties and
responsibilities of its employees for information security. Because new assets are
continually being added to the organization and new threats appear against the
assets, compliance monitoring and evaluation must be conducted regularly. One of
the most important acts in managing a wireless LAN is establishing a wireless
security policy. The backbone of any wireless network should be its security policy.
Without a policy that clearly outlines what needs to be protected, how it should be
protected, and what users can—and cannot—do in support of the policy, there is no
effective wireless security.