Home > Articles > CompTIA > Network+

📄 Contents

  1. Foundation Topics
  2. Exam Preparation Tasks
  • Print
  • + Share This
This chapter is from the book

This chapter is from the book

Exam Preparation Tasks

Review All the Key Topics

Review the most important topics from inside the chapter, noted with the Key Topic icon in the outer margin of the page. Table 8-4 lists these key topics and the page numbers where each is found.

Table 8-4. Key Topics for Chapter 8

Key Topic Element


Page Number

Figure 8-1

Basic WLAN topology with a wireless router


Figure 8-2

Basic WLAN topology with a wireless access point


Figure 8-3

Omnidirectional antenna coverage


Figure 8-4

Unidirectional antenna coverage


Figure 8-5

Nonoverlapping channels in the 2.4-GHz band



Spread spectrum transmission methods


Table 8-3

Characteristics of 802.11 standards


Figure 8-6

Independent basic service set (IBSS) WLAN


Figure 8-7

Basic service set (IBSS) WLAN


Figure 8-8

Extended service set (ESS) WLAN



Sources of interference


Figure 8-9

10–15 percent coverage overlap in coverage areas for nonoverlapping channels


Figure 8-10

Nonoverlapping coverage cells for the 2.4-GHz band



Wireless security threats



Security standards and best practices


Figure 8-12

IEEE 802.1x security for a WLAN


Complete Tables and Lists from Memory

Print a copy of Appendix C, "Memory Tables" (found on the CD), or at least the section for this chapter, and complete the tables and lists from memory. Appendix D, "Memory Table Answer Key," also on the CD, includes the completed tables and lists so you can check your work.

Define Key Terms

Define the following key terms from this chapter, and check your answers in the Glossary:

  • wireless access point (AP)
  • wireless router
  • decibel (dB)
  • omnidirectional antenna
  • unidirectional antenna
  • carrier sense multiple access collision avoidance (CSMA/CA)
  • direct-sequence spread spectrum (DSSS)
  • frequency-hopping spread spectrum (FHSS)
  • Orthogonal Frequency Division Multiplexing (OFDM)
  • 802.11a
  • 802.11b
  • 802.11g
  • 802.11n
  • multiple input
  • multiple output (MIMO)
  • channel bonding
  • independent basic service set (IBSS)
  • basic service set (BSS)
  • extended service set (ESS)
  • warchalking
  • service set identifier (SSID)
  • Wired Equivalent Privacy (WEP)
  • Wi-Fi Protected Access (WPA)
  • Wi-Fi Protected Access version 2 (WPA2)

Review Questions

The answers to these review questions are in Appendix A, "Answers to Review Questions."

  1. What type of antenna, commonly used in wireless APs and wireless routers in SOHO locations, radiates relatively equal power in all directions?

    1. Unidirectional
    2. Yagi
    3. Parabolic
    4. Omnidirectional
  2. When using the 2.4-GHz band for multiple access points in a WLAN located in the United States, which nonoverlapping channels should you select? (Choose three.)

    1. 0
    2. 1
    3. 5
    4. 6
    5. 10
    6. 11
    7. 14
  3. What technology do WLANs use to determine when they gain access to the wireless media?

    1. SPF
    2. CSMA/CA
    3. RSTP
    4. DUAL
  4. What IEEE 802.11 variant supports a maximum speed of 54 Mbps and uses the 2.4-GHz band?

    1. 802.11a
    2. 802.11b
    3. 802.11g
    4. 802.11n
  5. Which of the following is used by IEEE 802.11n to achieve high throughput through the use of multiple antennas for transmission and reception?

    1. MIMO
    2. DSSS
    3. FHSS
    4. LACP
  6. A WLAN formed directly between wireless clients (without the use of a wireless AP) is referred to as what type of WLAN?

    1. Enterprise mode
    2. IBSS
    3. Personal mode
    4. BSS
  7. When extended the range for a 2.4-GHz WLAN, you can use nonoverlapping channels for adjacent coverage cells. However, there should be some overlap in coverage between those cells (using nonoverlapping channels) to prevent a connection from dropping as a user roams from one coverage cell to another. What percentage of coverage overlap is recommended for these adjacent cells?

    1. 5–10 percent
    2. 10–15 percent
    3. 15–20 percent
    4. 20–25 percent
  8. If a WLAN does not require a user to provide any credentials to associate with a wireless AP and access the WLAN, what type of authentication is said to be in use?

    1. WEP
    2. SSID
    3. Open
    4. IV
  9. WEP's RC4 approach to encryption uses a 24-bit string of characters added to transmitted data, such that the same plain text data frame will never appear as the same WEP-encrypted data frame. What is this string of characters called?

    1. Initialization vector
    2. Chips
    3. Orthogonal descriptor
    4. Session key
  10. What standard developed by the Wi-Fi Alliance implements the requirements of IEEE 802.11i?

    1. TKIP
    2. MIC
    3. WEP
    4. WPA2
  • + Share This
  • 🔖 Save To Your Account