Vous êtes sur la page 1sur 5

CCNA Exploration 3, Chapter 7.

Basic Wireless Concepts and Configuration Worksheet


PLP_CISCO Networking Academy jmb, Instructor Name: 1. The IEEE has adopted the 802 LAN/MAN portfolio of computer network

architecture standards. The two dominant 802 working groups are 802.___ Ethernet and 802.____ wireless LAN.

2. Summarize the important differences, advantages, and disadvantages of WLANs using RF as opposed to wired LANs using cable for connectivity:

3. Wired LANs rely on collision _______________technology (CSMA/CD) whereas WLANs rely on collision ___________________avoidance (CSMA/CA).

4. What is the most important way in which IEEE 802.11a differs from 802.11b and 802.11g?

5. List the data rates for each of the following WLAN standards: a. 802.11a b. 802.11b c. 802.11g d. 802.11n

6. List the Pros and Cons of each WLAN standard: a. 802.11a

b. 802.11b
1

CCNA Exploration 3, Chapter 7. Basic Wireless Concepts and Configuration Worksheet


PLP_CISCO Networking Academy jmb, Instructor

c. 802.11g

d. 802.11n

7. List two modulation techniques and briefly state the difference between them:

8. List and briefly summarize the three key organizations influencing WLAN

standards:
9. What are the three roles that a wireless router typically performs simultaneously?

10. Briefly explain the different modes that a wireless network device can operate in:

11. Explain what an SSID is:

12. The 2.4 GHz band is broken down into ______ channels for North America and

_____ channels for Europe. These channels have a center frequency separation of only __________ and an overall channel bandwidth (or frequency occupation) of 22 MHz.

13. Best practices for WLANs that require multiple access points are set to use

_______________________ channels. If there are three adjacent access points, use channels ___, ____, and _______. If there are just two, select any two that are _________ channels apart.

14. Explain what a BSS is:


2

CCNA Exploration 3, Chapter 7. Basic Wireless Concepts and Configuration Worksheet


PLP_CISCO Networking Academy jmb, Instructor

15. What is meant by an ad hoc topology?

16. Explain what an ESS is:

17. Explain what a common distribution system is:

18. Explain what a beacon is:

19. Explain what a probe is and the two types of probe requests a client may send:

20. List considerations that would determine the number of users a WLAN can

support:

21. List and briefly describe the three major categories of threat that lead to

unauthorized WLAN access to an enterprise network:

22. Describe what is meant by a Rogue Access Point and the problems it can cause: 23. Describe a Man in the Middle attack and why it is a significant threat in a WLAN:

24. Define and briefly describe the WEP protocol:

25. Define and briefly describe the WPA protocol:


3

CCNA Exploration 3, Chapter 7. Basic Wireless Concepts and Configuration Worksheet


PLP_CISCO Networking Academy jmb, Instructor

26. Define and briefly describe 802.11i/WPA2:

27. Summarize the enterprise WLAN EAP authentication process:

28. Define and describe TKIP:

29. Define and describe AES:

30. List and describe various types of PSKs you might see when configuring a

Linksys wireless router:

31. List the three-step method for controlling WLAN access:

32. What is the default IP address of a Linksys wireless access point, such as the WRT300N?

33. What is the default username and password of a Linksys wireless access point, such as the WRT300N?

34. List the screens and steps you would use to configure basic security on a Linksys wireless access point, such as the WRT300N:

35. List the seven wireless security modes supported by the WTR300N:

CCNA Exploration 3, Chapter 7. Basic Wireless Concepts and Configuration Worksheet


PLP_CISCO Networking Academy jmb, Instructor

36. What is the difference between a personal security mode and an enterprise security mode?

After reading through all of section 7.3.x, stop and do PT Activity 7.3.2: Configuring Wireless LAN Access
37. List the first three steps in a systematic approach to WLAN troubleshooting:

38. Under what two circumstances only should you upgrade the firmware on a wireless access point?

39. What is the most likely cause if users report connectivity issues in the area

between access points in an extended service set WLAN?

Vous aimerez peut-être aussi