Home > Articles

Wireless Architecture and Design

📄 Contents

  1. "Do I Know This Already?" Quiz
  2. Foundation Topics
  3. Foundation Summary
  4. Q&A
  • Print
  • + Share This
Prepare for the CCNP BCMSN exam by mastering WLAN Security, Wireless Client Operation, AP Association and Roaming, and Cell Layout and Channel Usage.
This chapter is from the book

This chapter covers the following topics that you need to master for the CCNP BCMSN exam:

  • WLAN Security—This section presents an overview of the various methods for protecting a WLAN. These methods can be used to authenticate potential wireless clients and users, as well as to secure the data passing over the wireless medium.
  • Wireless Client Operation—This section explains the Cisco Compatible Extensions program and how it is used to find wireless hardware with compatible feature sets.
  • AP Association and Roaming—This section covers the process that wireless clients and access points use to form associations or logical connections. As wireless clients become mobile, their associations can be moved to other access points. This forms the basis of client roaming.
  • Cell Layout and Channel Usage—This section discusses the theory behind sizing and positioning access points so that they can work together to cover a large area. Part of this layout process is the assignment of RF channels and their distribution over the access point population.

"Do I Know This Already?" Quiz

The purpose of the "Do I Know This Already?" quiz is to help you decide what parts of this chapter to use. If you already intend to read the entire chapter, you do not necessarily need to answer these questions now.

The quiz, derived from the major sections in the "Foundation Topics" portion of the chapter, helps you determine how to spend your limited study time.

Table 18-1 outlines the major topics discussed in this chapter and the "Do I Know This Already?" quiz questions that correspond to those topics.

Table 18-1. "Do I Know This Already?" Foundation Topics Section-to-Question Mapping

Foundation Topics Section

Questions Covered in This Section


WLAN Security


Wireless Client Operation


AP Association and Roaming


Cell Layout and Channel Usage


Total Score

  1. If WPA or WPA2 is used as a wireless security suite, which one of the following represents a feature that is not offered in other wireless security methods?
    1. Virus mitigation
    2. Packet authentication
    3. Strong password policy
    4. Session time limits
  2. If WPA is used, how often can the encryption keys be generated?
    1. One key per AP association
    2. One key per client session
    3. One key per packet
    4. One key per minute
  3. TKIP is a protocol that is used with WPA to do which one of the following functions?
    1. Negotiate static WEP keys
    2. Generate per-packet encryption keys
    3. Authenticate a wireless user
    4. Authenticate wireless packets
  4. Most wireless security methods use which one of the following as the authentication mechanism?
    1. 802.1D
    2. 802.11x
    3. RADIUS
    4. 802.1X
  5. Which one of the following is a security feature that is unique to WPA2?
    1. AES encryption
    2. 3DES encryption
    3. WEP encryption
    4. Token-based encryption
  6. Which one of the following can be used to verify feature compatibility between wireless devices?
    1. IEEE 802.11b
    2. IEEE 802.11e
    3. CCX
    4. CCO
  7. Which one of the following determines when a wireless client will roam from one AP to another?
    1. The current AP has a weak signal from the client and asks it to roam
    2. The next AP overhears the client and asks it to roam
    3. The client's roaming algorithm reaches a threshold
    4. The client loses its IP address
  8. Which one of the following is moved when a wireless client roams to a new AP?
    1. Association
    2. Certificate
    3. Beacon
    4. Channel
  9. When a wireless client is actively roaming, which one of the following actions does it take?
    1. It listens for 802.11 beacons
    2. It listens for 802.11 Roam advertisements
    3. It sends an 802.11 Roam Request
    4. It sends an 802.11 Probe Request
  10. Wireless client roaming from AP to AP normally occurs at what layer of the OSI model?
    1. Layer 1
    2. Layer 2
    3. Layer 3
    4. Layer 4
  11. Which channels should be used across the 802.11b APs that are covering a floor of a building?
    1. 1, 2, 3
    2. 1, 3, 6
    3. 1, 3, 6, 11
    4. 1, 6, 11
    5. Any channel is fine
  12. When you are designing the AP channel layout for an area, which one of the following is the most important consideration?
    1. The number of channels is conserved
    2. APs in different areas use different channels
    3. Adjacent APs use nonoverlapping channels
    4. Clients are grouped into common channels

The answers to the "Do I Know This Already?" quiz are found in Appendix A, "Answers to Chapter 'Do I Know This Already?' Quizzes and Q&A Sections." The suggested choices for your next step are as follows:

  • 10 or less overall score—Read the entire chapter. This includes the "Foundation Topics," "Foundation Summary," and "Q&A" sections.
  • 11 or more overall score—If you want more review on these topics, skip to the "Foundation Summary" section and then go to the "Q&A" section at the end of the chapter. Otherwise, move to Chapter 19, "Cisco Unified Wireless Network."
  • + Share This
  • 🔖 Save To Your Account