Home > Articles

  • Print
  • + Share This
This chapter is from the book


The questions and scenarios in this book are more difficult than what you should experience on the actual exam. The questions do not attempt to cover more breadth or depth than the exam; however, they are designed to make sure that you know the answers. Rather than allowing you to derive the answers from clues hidden inside the questions themselves, the questions challenge your understanding and recall of the subject. Hopefully, these questions will help limit the number of exam questions on which you narrow your choices to two options and then guess.

You can find the answers to these questions in Appendix A.

  1. Consider the following wireless security methods. Based on encryption alone, which could be considered the most secure?
    1. Open authentication
    2. Pre-shared key
    3. LEAP
    4. WPA
    5. WPA2
  2. Describe the weakness of using static WEP keys.
  3. When is it considered appropriate to secure a WLAN with only open authentication, assuming that the SSID is kept secret?
  4. What things should you consider when sizing an AP cell?
  5. Should adjacent AP cells be configured to operate on the same channel? Why or why not?
  6. Suppose that a set of 802.11b APs are configured to use channels 1, 6, and 11 in an alternating fashion. What channels should you choose when the 802.11g portion of the same APs are configured?
  7. Suppose that 802.11a clients and APs are introduced into an area already using 802.11b or 802.11g. What effect will this have?
  8. Suppose that an office area has wireless coverage from several APs, each using a very small cell size. Should you be concerned about the power output (and therefore the cell size) of client devices?
  • + Share This
  • 🔖 Save To Your Account