All contents copyright (c) 2011 ZyXEL Communications Corporation.
4
How many Access Points are required in a given area? ................................76
What is Direct-Sequence Spread Spectrum Technology – (DSSS)? ..............76
What is Frequency-hopping Spread Spectrum Technology – (FHSS)? .........76
Do I need the same kind of antenna on both sides of a link?.......................77
What is the 2.4 Ghz Frequency range? ...........................................................77
What is Server Set ID (SSID)? ..........................................................................77
What is an ESSID? ............................................................................................77
How do I secure the data across an Access Point's radio link? .....................78
What is WEP? ...................................................................................................78
What is the difference between 40-bit and 64-bit WEP? .............................78
What is a WEP key?..........................................................................................79
A WEP key is a user defined string of characters used to encrypt and
decrypt data? ...................................................................................................79
Can the SSID be encrypted? ............................................................................79
By turning off the broadcast of SSID, can someone still sniff the SSID? ......79
What are Insertion Attacks? ............................................................................80
What is Wireless Sniffer? .................................................................................80
What is the difference between Open System and Shared Key of
Authentication Type? .......................................................................................80
What is 802.1x? ................................................................................................80
What is the difference between No authentication required, No access
allowed and Authentication required?...........................................................81
What is AAA? ....................................................................................................81
What is RADIUS? ..............................................................................................82
What is WPA? ...................................................................................................82
What is WPA-PSK?............................................................................................82
What is WPA2? .................................................................................................82