Académique Documents
Professionnel Documents
Culture Documents
architecture standards. The two dominant 802 working groups are 802.___ Ethernet and 802.____ wireless LAN.
2. Summarize the important differences, advantages, and disadvantages of WLANs using RF as opposed to wired LANs using cable for connectivity:
3. Wired LANs rely on collision _______________technology (CSMA/CD) whereas WLANs rely on collision ___________________avoidance (CSMA/CA).
4. What is the most important way in which IEEE 802.11a differs from 802.11b and 802.11g?
5. List the data rates for each of the following WLAN standards: a. 802.11a b. 802.11b c. 802.11g d. 802.11n
b. 802.11b
1
c. 802.11g
d. 802.11n
7. List two modulation techniques and briefly state the difference between them:
8. List and briefly summarize the three key organizations influencing WLAN
standards:
9. What are the three roles that a wireless router typically performs simultaneously?
10. Briefly explain the different modes that a wireless network device can operate in:
12. The 2.4 GHz band is broken down into ______ channels for North America and
_____ channels for Europe. These channels have a center frequency separation of only __________ and an overall channel bandwidth (or frequency occupation) of 22 MHz.
13. Best practices for WLANs that require multiple access points are set to use
_______________________ channels. If there are three adjacent access points, use channels ___, ____, and _______. If there are just two, select any two that are _________ channels apart.
19. Explain what a probe is and the two types of probe requests a client may send:
20. List considerations that would determine the number of users a WLAN can
support:
21. List and briefly describe the three major categories of threat that lead to
22. Describe what is meant by a Rogue Access Point and the problems it can cause: 23. Describe a Man in the Middle attack and why it is a significant threat in a WLAN:
30. List and describe various types of PSKs you might see when configuring a
32. What is the default IP address of a Linksys wireless access point, such as the WRT300N?
33. What is the default username and password of a Linksys wireless access point, such as the WRT300N?
34. List the screens and steps you would use to configure basic security on a Linksys wireless access point, such as the WRT300N:
35. List the seven wireless security modes supported by the WTR300N:
36. What is the difference between a personal security mode and an enterprise security mode?
After reading through all of section 7.3.x, stop and do PT Activity 7.3.2: Configuring Wireless LAN Access
37. List the first three steps in a systematic approach to WLAN troubleshooting:
38. Under what two circumstances only should you upgrade the firmware on a wireless access point?
39. What is the most likely cause if users report connectivity issues in the area