2 cissp ® Official Study Guide Eighth Edition


Understand the different wireless technologies



Download 19,3 Mb.
Pdf ko'rish
bet483/881
Sana08.04.2023
Hajmi19,3 Mb.
#925879
1   ...   479   480   481   482   483   484   485   486   ...   881
Bog'liq
(CISSP) Mike Chapple, James Michael Stewart, Darril Gibson - CISSP Official Study Guide-Sybex (2018)

515
Understand the different wireless technologies.
Cell phones, Bluetooth (802.15), and 
wireless networking (802.11) are all called wireless technologies, even though they are all 
different. Be aware of their differences, strengths, and weaknesses. Understand the basics 
of securing 802.11 networking.
Understand Fibre Channel.
Fibre Channel is a form of network data storage solution (i.e., 
SAN (storage area network) or NAS (network-attached storage)) that allows for high-speed 
file transfers.
Understand FCoE.
FCoE (Fibre Channel over Ethernet) is used to encapsulate Fibre 
Channel communications over Ethernet networks.
Understand iSCSI.
iSCSI (Internet Small Computer System Interface) is a networking stor-
age standard based on IP.
Understand 802.11 and 802.11a, b, g, n, and ac.
802.11 is the IEEE standard for wireless 
network communications. Versions include 802.11 (2 Mbps), 802.11a (54 Mbps), 802.11b 
(11 Mbps), 802.11g (54 Mbps), 802.11n (600 Mbps), and 802.11ac (1.3+ Mbps). The 
802.11 standard also defines Wired Equivalent Privacy (WEP).
Understand site survey.

site survey
is the process of investigating the presence, strength, 
and reach of wireless access points deployed in an environment. This task usually involves 
walking around with a portable wireless device, taking note of the wireless signal strength, 
and mapping this on a plot or schematic of the building.
Understand WPA2.
WPA2 is a new encryption scheme known as the Counter Mode with 
Cipher Block Chaining Message Authentication Code Protocol (CCMP), which is based on 
the AES encryption scheme.
Understand EAP.
EAP (Extensible Authentication Protocol) is not a specific mechanism 
of authentication; rather it is an authentication framework. Effectively, EAP allows for new 
authentication technologies to be compatible with existing wireless or point-to-point con-
nection technologies.

Download 19,3 Mb.

Do'stlaringiz bilan baham:
1   ...   479   480   481   482   483   484   485   486   ...   881




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish