* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Ch10
Signals intelligence wikipedia , lookup
Mobile device forensics wikipedia , lookup
Distributed firewall wikipedia , lookup
Mobile security wikipedia , lookup
Computer and network surveillance wikipedia , lookup
Wireless security wikipedia , lookup
Network tap wikipedia , lookup
Ch. 10 Review Questions 1. Monitoring a wireless network can be performed with two different sets of tools, specific WLAN utilities and _____ tools. a. standard networking b. address resolution protocol c. encryption d. Device Interrupt Driver (DID) 2. Most operating systems have basic tools for _____. a. speed and data modeling b. packet and frame traversal c. writing firmware updates d. monitoring the WLAN 3. Windows Wireless Network Connection Status window shows each of the following except ________, a. SSID b. relative signal strength c. number of bytes sent and received d. authentication challenge text 4. Each of the following is data that many enterprise-level access points can provide except a. event log b. wireless transmission statistics c. intercepted packets d. Ethernet connection statistics 5. Each of the following is a limitation of data collected from an access point except a. cannot retain data b. size of packets c. labor-intensive d. timeliness of data 6. Wireless networks require more management than wired networks. True or False? 7. The Simple Network Management Protocol (SNMP) is a protocol that allows computers and network equipment to gather data about network performance. True or False? 8. The SNMP management station communicates with the Management Information Base (MIB) on each network device and collects and stores the data in software agents. True or False? 9. Whenever the network exceeds a predefined limit, it triggers an alert message, called an SNMP trap, which is sent to the management station. True or False? 10. Electrically-Erasable Programmable Read-Only Memory can be programmed and erased multiple times electrically but can only be read 1,024 times. True or False? 11. It is virtually impossible to manage a wireless network without the ability to _____ what is happening on the network. monitor 12. _____ is an SNMP-based tool that is used to monitor LANs that are connected through a wide area network (WAN). Remote Network Monitoring (RMON) 13. _____ is software that is embedded into hardware in order to control the device. Firmware 14. Once an AP’s firmware has been upgraded there are several settings that may need to be adjusted and this is known as _____. RF site tuning 15. A(n) _____ is a rough calculation of all known elements of the link to determine if the signal will have the proper strength when it reaches the other end of the link. link budget 16. Explain how Simple Network Management Protocol collects data and the type of data that is gathered. Software agents are loaded onto each network device that will be managed using SNMP. Each agent monitors network traffic and stores that information in its management information base (MIB). In addition, a computer with the SNMP management software, known as the SNMP management station, must also be on the network. The SNMP management station communicates with the software agents on each network device and collects the data stored in the MIBs. It then combines all of the data and produces statistics about the network. This data includes transmission or connectivity errors, the number of bytes or data packets sent, and information on IP activity and addressing. 17. Describe a rod antenna and its RF patter. The type of antenna that is most typically used on a wireless LAN is a rod antenna. A rod antenna for an access point looks like a slim rod approximately half an inch in diameter and may vary in length from four to six inches. Rod antennas are omnidirectional (also called dipole antennas). The radiation pattern of the signal is a full 360 degrees around the antenna, so a rod antenna mounted vertically will transmit in 360 degrees to the horizon. This means that the transmission pattern of a rod antenna is focused along the horizontal plane. Increasing the length of the rod creates a “tighter” the 360 degree beam, which means that a stronger signal is sent along the horizon but devices that are vertically above or below the antenna receive less of a signal. 18. What is a sectorized antenna? A sectorized antenna “cuts” the standard 360 degree pattern into four quarters. Each quarter has its own transmitter and antenna. In this way the radiation pattern can be specialized for North, South, East, and West transmissions, with additional power given to different quarters as necessary. 19. Describe the two types of RF amplifers. An RF amplifier is a device that will amplify or increase the amplitude of an RF signal. The positive difference in amplitude between two signals is known as gain. Although gain can occur unintentionally when an RF signal bounces off an object and combines with the original signal to amplify it, more often it is necessary to “boost” a signal to compensate for loss of power. This loss may be the result of the distance between the AP and the wireless device or it could be due to the length of cable from a wireless device to its antenna (as when an external antenna is attached to an AP. RF amplifiers can be one of two types. A unidirectional amplifier increases the RF signal level before it is injected into the transmitting antenna. A bi-directional amplifier boosts the RF signal before it is injected into the device that contains the antenna. For a WLAN this would be the access point or wireless device. Most RF amplifiers for WLANs are bi-directional. 20. What is a wireless security policy and why is it important? A security policy is a document or series of documents that clearly defines the defense mechanisms an organization will employ to keep information secure. It also outlines how the organization will respond to attacks as well as the duties and responsibilities of its employees for information security. Because new assets are continually being added to the organization and new threats appear against the assets, compliance monitoring and evaluation must be conducted regularly. One of the most important acts in managing a wireless LAN is establishing a wireless security policy. The backbone of any wireless network should be its security policy. Without a policy that clearly outlines what needs to be protected, how it should be protected, and what users can—and cannot—do in support of the policy, there is no effective wireless security.