& Standards
What does the acronym "SSID" stand for in the context of wireless networks?
Service Set Identifier.
What security measure can be implemented to restrict access to a wireless network based on the hardware address of a device?
MAC address filtering can be used to allow or deny access to the network based on the MAC addresses of devices.
What is a mesh network, and how does it benefit wireless network design?
A mesh network uses interconnected nodes to provide multiple paths for data transmission, increasing reliability and coverage.
What does the acronym "IDS" stand for in the context of network security?
Intrusion Detection System.
What action could you take if a wireless access point repeatedly disconnects from the network or experiences frequent dropouts?
Troubleshooting the power source, checking for firmware updates, or replacing the access point if necessary.
Which IEEE standard is commonly used for wireless LAN communications in the 2.4 GHz and 5 GHz frequency bands?
IEEE 802.11 (commonly known as Wi-Fi)
How can you improve the performance of a wireless network in a congested area?
By configuring the access points to use non-overlapping channels and optimizing their placement.
How can you optimize channel selection in a wireless network to minimize interference?
By choosing non-overlapping channels (such as channels 1, 6, and 11 in the 2.4 GHz band) and adjusting channel widths based on network requirements.
Which encryption protocol is commonly used to secure data transmitted over the internet, including emails and web traffic?
SSL/TLS (Secure Sockets Layer/Transport Layer Security).
If multiple users report slow internet speeds on a wireless network, what troubleshooting step could you take to identify the cause?
Analyzing network traffic to identify bandwidth-intensive applications or devices that may be causing congestion.
What is the purpose of the MAC address in wireless networking?
It is used to uniquely identify devices on a network.
What security measure can be implemented to prevent unauthorized users from gaining access to a wireless network?
Using strong authentication methods such as WPA3 with a complex passphrase.
What is the purpose of conducting a site survey before deploying a wireless network?
To analyze the physical environment, identify potential sources of interference, and determine optimal placement of access points.
What is the purpose of a firewall in network security?
Firewalls monitor and control incoming and outgoing network traffic based on predefined security rules, helping to block unauthorized access and malicious activities.
What could be a likely reason if a wireless network suddenly experiences a significant decrease in signal strength?
Possible reasons include changes in the environment (e.g., new construction, large objects obstructing the signal) or malfunctioning hardware.
Which encryption protocol is commonly used to secure wireless networks and is considered more secure than WEP?
WPA2 (Wi-Fi Protected Access 2)
What does Quality of Service (QoS) configuration on a wireless access point enable?
It allows prioritizing certain types of traffic (such as video streaming or VoIP) to ensure a better user experience.
What is the significance of using VLANs (Virtual Local Area Networks) in wireless network design?
VLANs help segregate network traffic for different purposes or user groups, improving security and network management.
What type of attack involves sending a flood of packets to a target system in an attempt to overwhelm it and disrupt its services?
DDoS (Distributed Denial of Service) attack.
What could be a potential cause if a device fails to connect to a wireless network despite entering the correct passphrase?
Possible causes include incorrect network settings, signal interference, or MAC address filtering.
What does the term "bandwidth" refer to in the context of wireless communications?
It refers to the maximum data transfer rate of a wireless connection, typically measured in megabits per second (Mbps).
What does adjusting the transmit power of a wireless access point help with?
Controlling the range and coverage of the wireless signal.
What is the purpose of configuring roaming parameters in a wireless network?
Configuring roaming parameters helps devices seamlessly switch between access points as they move within the network, maintaining a stable connection without interruption.
How does a VPN (Virtual Private Network) enhance network security for remote users?
A VPN encrypts data transmitted between a remote user and the corporate network, ensuring secure communication over untrusted networks like the internet.
If a wireless device experiences intermittent connectivity issues, what troubleshooting step could you take to improve the situation?
Checking for and removing sources of interference, such as other electronic devices or physical obstructions.