Wi-Fi Interview Questions & Answers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 6
At a glance
Powered by AI
Some of the key takeaways are that Wi-Fi operates using 802.11 protocols and standards like 802.11a, 802.11b, 802.11g/n. It also discusses configuring and connecting to Wi-Fi networks, as well as Wi-Fi modes and providers.

The different Wi-Fi standards mentioned are 802.11a, 802.11b, 802.11g/n which operate at different speeds and frequencies.

Ad-Hoc mode is a peer-to-peer network where devices communicate directly with each other, while Infrastructure mode uses an access point to connect devices to a network.

Wi-Fi Interview Questions & Answers:

1. How to configure Wi-Fi network?

Basically there are many standards of Wi-Fi in the industry but some popular of them are
802.11a, 802.11b, 802.11g/n. With the support of these Wi-Fi protocols we can
communicate/interact among the devices at the speed of 5Ghz to 2.4Ghz dual band
communication.
If we have Wi-Fi nic card so firstly we have to install their drivers and after installation if we
have Wi-Fi access point then we can see the signal strength in the right corner below just open
that and find the access point to connect, if access point is configured with the security, type the
key to connect and enjoy the service.

2. What are Wi-Fi protocols?

Wi-Fi is technically referred to as the 802.11 protocol. Over time, Wi-Fi has improved, giving
rise to different variations of the protocol.
802.11a - This version operates at 54Mbps. It is considered as the favorite wireless LAN
protocol for IP telephony.

3. What is Ad-Hoc in Wi-Fi?

Ad-Hoc is Latin meaning "for this purpose" so these are the networks which are basically created
for some purpose. So these are the group of workstations which communicate directly witch each
other to exchange information. An Ad-Hoc network is also called as a peer to peer network.

4. What is Infrastructure in Wi-Fi?

Infrastructure mode, network includes an access point when the wireless clients connect to an
access point, which in turn bridges to a network. Infrastructure network can pass information
through a central information hub which can be both, hardware or software device on a
computer. So under this devices in a wireless network are set up to communicate through an
access point.

5. What are the different Wi-Fi generations?

The IEEE 802.11 generation is actually only the earliest standard, allowing 1-2 Mbps of
bandwidth. Amendments have be made to the original standard in order to optimize bandwidth
(these include the 802.11a, 802.11b and 802.11g standards, which are also called 802.11 physical
standards) or to better specify components in order to ensure improved security or compatibility.

6. What assets are available for wireless?

Brand assets are available here for wireless, brand assets can also be applied to m-branding. In
particular, three of the assets can be targeted directly for improvement with the m-branding
methods that are available today. These are brand awareness, brand associations and brand
loyalty.

7. Who are the providers of Wi-Fi?

Some of the providers for wireless are as follows:


★ Wireless Internet- Nationwide Coverage Unlimited
★ Faster Internet on Mobile
★ New 3G BlackBerry
★ Aircel Pocket Internet
★ Reliance 3G Online Offer
★ Cisco Managed Switches
And many more.

8. How UWB (ultra-wideband) is different from Wi-Fi?

Wi-Fi really wasn't built to move audio and video, it was built for data traffic where if there's
delay, while UWB is better suited for multimedia for a couple of reasons, i.e. for starters, it's
throughput for surpasses that of Wi-Fi.

9. How UWB (ultra-wideband) is different from FireWire?

Since FireWire is meant to deliver high speed, it is also designed to work with high power drain
services. It therefore can provide much more power to the devices that connect to it. It can
deliver up to 60 watts of energy. So the only difference here is of power it uses more power than
UWB.

10. How UWB (ultra-wideband) different from Bluetooth?

The key difference among UWB and Bluetooth are of range, power, consumption and intended
use. It is basically meant for short distances up to (10m). It is low power consuming than UWB.

11. What is UWB (ultra-wideband)?

UWB is Radio Frequency technology that transmits binary data, using low energy and short
duration impulses over a wide spectrum of frequencies. It delivers data over 15 to 100 meters
and does not require a dedicated radio frequency. For example, a UWB signal centered at 5GHz
typically extends across 4GHz and 6GHz. At longer distances, UWB data rates drop
considerably.

12. What are the preferred tools for WarDriving?

★ Kismet- Kismet is a 802.11b wireless network sniffer. It is capable of sniffing using almost
any wireless card supported in Linux.
★ Airsnort- is one of the first tools to come out discovering insecurity of wireless network.
AirSnort is a wireless LAN (WLAN) tool which cracks encryption keys on 802.11b WEP
networks. AirSnort operates by passively monitoring transmissions, computing the encryption
key when enough packets have been gathered.
★ WEPCrack is Perl based tool. WEPCrack is a tool that cracks 802.11 WEP encryption keys
using the latest discovered weakness of RC4 key scheduling.
★ WaveStumbler is console based 802.11 network mapper for Linux. It reports the basic AP
stuff like channel, WEP, ESSID, MAC etc.
★ Aircrack yet another WEP cracking tool for Linux courtesy by divine.

13. How to secure wireless network?

★ Verify that your PC's software firewall is turned on, and that Window's file-sharing feature is
off; it's off by default in Window's XP with Service Pack 2.
★ Never send bank passwords, credit card numbers, confidential e-mail, or other sensitive data
unless you're sure you're on secure site: Look for the lock icon in the bottom-right corner of your
browser, as well as a URL in the address bar that begins with https. Such sites build in their own
encryption.
★ Always turn your Wi-Fi radio off when you're not at a hotspot: Hackers can use it to create
peer-to-peer Wi-Fi connections with your computer and access it directly.
★ For better security, consider signing up for a paid subscription to a hotspot network such as
Boingo or T-Mobile. Both companies provide connection software that encrypts your sessions
automatically.

14. What are the disadvantages of infrastructure network?

★ Use of more wireless access points.


★ This increase the cost of implementing a wireless network solution.

15. What are the benefits of infrastructure network?

★ In this you do not have to control over the path your data takes.
★ Connect to a wired network.
★ Extend your wireless network's range.
★ Utilize roaming ability.

16. What are disadvantages of an Ad-Hoc network?

★ It is not able to get into the mainstream wired local area network.
★ It needs more technology to support their reliability.
★ As the network increases its speed slows down considerably.

17. What are benefits of an Ad-Hoc network?


★ The possibilities with Ad-Hoc network are quite endless.
★ Ad-Hoc networks are simple to set up.
★ Ad-Hoc networks are inexpensive.
★ Ad-Hoc networks are fast.

18. Can you please explain the difference between Ad-Hoc and Infrastructure topology?

Wireless networks typically work in one of two configurations: Ad-Hoc or Infrastructure.


Ad-Hoc is Latin meaning "for this purpose" so these are the networks which are basically created
for some purpose. So these are the group of workstations which communicate directly witch each
other to exchange information. An Ad-Hoc network is also called as a peer to peer network.

In Infrastructure mode, network includes an access point when the wireless clients connect to an
access point, which in turn bridges to a network. Infrastructure network can pass information
through a central information hub which can be both, hardware or software device on a
computer. So under this devices in a wireless network are set up to communicate through an
access point.

19. Suppose if you are using WEP (Wired Equivalent Privacy) Password with backtrack
then how you crack Wi-Fi network?

The first line of defense of your Wi-Fi network is encryption, which encodes the data transmitted
between your PC and your wireless router.
WEP abbreviates for (Wireless Encryption Protocol) it is a less-secure protocol than WPA
(Wireless Protected Access). Since WEP is relatively easy to crack, so you have to use the same
form on all devices on your network. If you have an older router that supports WEP only you'll
be best safest if you use 128-bit bit WEP keys but also check the manufacturer's Web site for a
firmware update that will add WPA support.

Two of the most popular programs used for actually cracking the WEP key are Airsnort and
Aircrack. Airsnort can be used with the .dump files that Kismet provides; and Aircrack can be
use with .cap files that Airodump provides.

20. What are wifi recommended channels?

★ Channel 1: 2.412 MHz


★ Channel 2: 2.417 MHz
★ Channel 3: 2.422 MHz
★ Channel 4: 2.427 MHz
★ Channel 5: 2.432 MHz
★ Channel 6: 2.437 MHz
You can choose from these channels while setting up the WLANs.

21. Suppose if you are setting up three WLANs and want minimum interference over there
then what are recommended channels?
There is a need of selecting the channels for setting up WLANs, to communicate; all the
components of a Wi-Fi network must use the same channel. In the Wi-Fi network in
infrastructure mode (using an access point), it depends on the channel set at the access point.
For better results when using Wi-Fi, it is necessary to adjust the channel on the access point as
well as configured on the client, to take the least use channel in your neighborhood.
To do this you can use software such as NetStumbler, which will list the neighborhood Wi-Fi
networks and channels used.

22. Define Piggybacking in context to Wi-Fi?

Piggybacking is a term which states that something that is riding on the back of something else
to complete his/her motive, just like similar to an idiom putting gun to another's shoulder and
performing the Hunting, so piggybacking is a term used to refer to access of a wireless internet
connection by bringing one's own computer within the range of another's wireless connection,
and using that service without the subscriber's explicit permission or knowledge. It is a legally
and ethically controversial practice, with laws that vary in jurisdictions around the world.
Piggybacking is an unauthorized tapping into another's connection with a public utility.
For e.g.- So piggybacking can be takes place like when I am accessing the wireless connection of
my neighbor Wi-Fi without his/her knowledge by hacking his static ip address, then it would be
possible for me to access the Wi-Fi connection of others.

23. Is Wi Fi the same as Bluetooth?

No. While both are wireless technology terms, Bluetooth technology lives under the IEEE
protocol 802.15.1, while Wi Fi falls under the 802.11 specification. What this means for
consumers is that appliances using Wi Fi technology and those using Bluetooth technology are
not interoperable. Bluetooth and Wi Fi are different in several ways, and are not necessarily in
competition. Wi Fi technology boasts faster data transfer speeds and range, making it a good
replacement for Ethernet (802.3) systems, while Bluetooth requires less power and is therefore
more prominent in small appliances, such as PDAs.

24. Will I need to have an account with a Wi-Fi service provider?

Generally, no. You should be able to sign up with the provider at the location. Many providers
will display instructions when browser software opens on a WiFi-enabled computer. If you don't
have an account, simply start your computer and make sure your Wi Fi card is plugged on. Then,
open a browser.

25. How Can I Use Wi Fi?

You must be using a computer or PDA that has Wi Fi connectivity already working. Most
portable computers can add Wi Fi using an adapter that plugs into a PC card slot or USB port.

26. What is a Wi Fi Hotspot?


A Wi Fi hotspot is defined as any location in which 802.11 (wireless) technology both exists and
is available for use to consumers. In some cases the wireless access is free, and in others,
wireless carriers charge for Wi Fi usage. Generally, the most common usage of Wi Fi technology
is for laptop users to gain Internet access in locations such as airports, coffee shops, and so on,
where Wi Fi technology can be used to help consumers in their pursuit of work-based or
recreational Internet usage.

27. Is my data and e-mail secure at a Wi-Fi?

You should never conduct unsecured transactions that include any account or password
information over public hotspots using FTP, email, or the Web. Try to use SSL for email (POP
and SMTP), or read your email with a Web browser using an SSL connection. Ask your ISP if
they offer SSL secure web-based email.

28. What can I do at a Wi-Fi?

The Wi-Fi wireless broadband connection allows you to do anything you'd do from home or the
office. You can surf the Web, check your e-mail, connect to your Corporate network (be sure to
use a secure VPN connection), make free Voice over IP phone calls, play online games, update
your blog, and IM with your friends. If you just have a modem dial-up account at home you'll
probably end up spending more time at the Wi-Fi once you see how much faster it is.

29. What does Free Wi-Fi really mean?

As the availability of Free Wi-Fi locations continues to spread I thought it might be good to
review what Free might mean in different types of locations. The locations listed in the Wi-Fi
Directory all offer some type of Free Wi-Fi access to the public, but sometimes there may be
access requirements/restrictions that are unique to a particular type of location, and therefore the
access, although free, may not be available to everyone/anyone. While accessing the Free Wi-Fi
in certain locations you will be spending money to pay for a Hotel room or space in a RV Resort
or for coffee in a cafe, etc. so the following information should help to clarify what Free Wi-Fi
really means in different locations.

30. What is Wi-Fi Technology?

A way to get Internet access, the term Wi Fi is a play upon the decades-old term HiFi that
describes the type of output generated by quality musical hardware, Wi Fi stands for Wireless
Fidelity and is used to define any of the wireless technology in the IEEE 802.11 specification -
including (but not necessarily limited to) the wireless protocols 802.11a, 802.11b, and 802.11g.
The Wi-Fi Alliance is the body responsible for promoting the term and its association with
various wireless technology standards.

You might also like