Wireless Networking & Security (CCST Networking) Flashcards
Cisco CCST Networking 100-150 Flashcards

| Front | Back |
| 802.11a main frequency | 5 GHz |
| 802.11ac key features | 80 and 160 MHz channels MU MIMO and wider 5 GHz operation |
| 802.11ad main use case | Short range multi gigabit links in 60 GHz band |
| 802.11ax key features | Orthogonal Frequency Division Multiple Access OFDMA and improved efficiency in dense deployments |
| 802.11b main frequency | 2.4 GHz |
| 802.11be goals | Extremely high throughput and enhanced multi user performance |
| 802.11g main frequency | 2.4 GHz |
| 802.11n key features | MIMO channel bonding and 2.4 GHz and 5 GHz support |
| Adjacent channel interference cause | Overlapping channels cause significant interference in 2.4 GHz |
| Antenna type directional use | Focus coverage along a corridor or point to point link |
| Antenna type omnidirectional use | Broad area coverage for general purpose AP placement |
| Authentication vs association difference | Authentication proves identity association registers client with AP for data |
| Backhaul consideration for high density | Ensure wired network capacity and AP uplink aggregation |
| Beacon frame purpose | Announce network presence and capabilities |
| Best practice for SSID naming | Use non identifying names avoid revealing company assets |
| BSSID meaning | Basic Service Set Identifier typically an AP MAC address |
| Captive portal typical use | Walled garden for web based authentication often used in guest networks |
| Client isolation purpose | Prevent clients on same SSID from communicating directly |
| Deauthentication attack description | Attacker forges deauth frames to disconnect clients |
| Density design principle | Design for number of concurrent clients per AP not just coverage |
| DFS purpose | Dynamic Frequency Selection avoids radar by moving channels when required |
| EAP PEAP characteristic | Tunnelled EAP protects inner authentication typically with server certificate |
| EAP TLS characteristic | Certificate based mutual authentication often considered most secure |
| EAP TTLS characteristic | Client credentials protected inside secure tunnel allows legacy inner methods |
| ESS meaning | Extended Service Set multiple APs sharing an SSID |
| Evil twin attack description | Fake AP impersonates real network to capture credentials |
| Guest network best practices | Separate VLAN and firewall along with client isolation |
| How to reduce co channel interference | Use careful channel planning and limit AP power in dense deployments |
| How to troubleshoot intermittent disconnects | Check interference channel overlap and client drivers |
| How to troubleshoot low throughput step 1 | Check signal strength and SNR |
| IBSS meaning | Independent Basic Service Set ad hoc mode |
| Logging and monitoring for wireless security | Collect RADIUS and AP logs for anomaly detection |
| Non overlapping 2.4 GHz channels | Channels 1 6 and 11 |
| Power setting best practice | Avoid running APs at full power in dense environments balance cell sizes |
| Probe request and response roles | Client probes and APs respond to reveal SSIDs and capabilities |
| Regulatory domain importance | Determines allowed channels power and DFS requirements |
| Roaming improvement feature | 802.11r fast BSS transition reduces reauthentication delay |
| Rogue AP definition | Unauthorized AP connected to network or broadcasting company SSID |
| Role of WMM | QoS to prioritize voice video and best effort traffic |
| SSID hiding security myth | Hiding SSID provides little real security it can still be discovered |
| SSID meaning | Service Set Identifier |
| TKIP purpose legacy | Compatibility mode for older devices not recommended for security |
| What are Protected Management Frames | Management frame protection to prevent spoofing and deauth attacks |
| What is 802.1X | Port based network access control using EAP and authentication server |
| What is beamforming | Directing signal energy toward client to improve SNR and range |
| What is channel bonding | Combining adjacent channels to increase throughput at cost of more interference |
| What is MIMO | Multiple Input Multiple Output uses multiple antennas to increase throughput |
| What is MU MIMO | Multi User MIMO serves multiple clients simultaneously to improve efficiency |
| What is OFDM | Orthogonal Frequency Division Multiplexing modulation used in modern Wi Fi |
| What is PMK in WPA | Pairwise Master Key derived during authentication used to generate session keys |
| What is PSK | Pre Shared Key simple password based authentication |
| What is RADIUS role | Centralized authentication authorization and accounting for 802.1X |
| What is SAE | Password based authenticated key exchange used in WPA3 |
| What is SNR importance | Signal to Noise Ratio determines link quality and throughput potential |
| What is spectrum analysis used for | Detect non Wi Fi interference sources like microwaves and cordless phones |
| What is WPA2 encryption standard | AES CCMP |
| Why perform a site survey | Identify coverage capacity and interference issues before deployment |
| Why use 20 MHz channel width | Better range and reduced interference for stable connections |
| WPA2 vulnerability KRACK | Replayed handshake packets can force key retransmission mitigated by patches |
| WPA3 key enhancements | Simultaneous Authentication of Equals SAE and improved forward secrecy |
| WPS security recommendation | Disable WPS because PIN method is vulnerable to brute force |
Related Study Materials
About the Flashcards
This study set provides a comprehensive review of essential wireless networking concepts. These flashcards for the Cisco CCST Networking exam are designed to help you master key terminology and technical details. The deck covers the evolution of 802.11 standards, from legacy versions to modern Wi-Fi, explaining the features of each. You will also find detailed cards on fundamental wireless security protocols, including WPA2, WPA3, and various EAP types used in enterprise networks.
Beyond standards and security, these cards explore critical radio frequency (RF) principles like MIMO, channel management, and beamforming. The material delves into network design, site surveying, and troubleshooting common issues such as interference and low throughput. This will help you understand how to plan, secure, and maintain robust wireless networks, preparing you for questions on both theoretical concepts and real-world application.
Topics covered in this flashcard deck:
- 802.11 Wireless Standards
- Wireless Security Protocols
- RF Fundamentals and Concepts
- Network Design and Troubleshooting
- Common Wireless Attacks