

Wireless LAN Technologies Final Exam
Course Introduction
Wireless LAN Technologies explores the principles, architectures, and protocols underlying wireless local area networks. The course covers key standards such as IEEE 802.11 (Wi-Fi), wireless network design and deployment, radio frequency fundamentals, security mechanisms, performance optimization, and troubleshooting techniques. Students gain hands-on experience configuring wireless devices, analyzing network traffic, and addressing real-world challenges in wireless communication. Emphasis is placed on emerging trends, interoperability, and best practices for secure and efficient wireless network operations in both home and enterprise environments.
Recommended Textbook
CWNA Guide to Wireless LANs Networking 2nd Edition by Mark Ciampa
Available Study Resources on Quizplus
12 Chapters
504 Verified Questions
504 Flashcards
Source URL: https://quizplus.com/study-set/1032

Page 2

Chapter 1: Its a Wireless World
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20462
Sample Questions
Q1) Where can a RFID tag be read?
A) only when next to the scanner
B) anywhere within the range of a transmitted radio signal
C) only within the line of sight of the scanner
D) when physically connected to the scanner
Answer: B
Q2) Describe free space optics (FSO) wireless technology. Answer: FSO can transmit at speeds up to 1.25 Gbps (gigabits, or billion bits, per second) over a distance of 6.4 kilometers (4 miles). Transmissions are sent by low-powered infrared beams through the open air. These beams, which do not harm the human eye, are received by transceivers. Because it is a line-of-sight technology, the transceivers are mounted in the middle or upper floors of office buildings to provide a clear transmission path. However, unlike other wireless technologies such as WiMax that require the units to be located on an open roof, transceivers can be mounted behind a window in the existing offices.
Q3) It is well documented that high levels of RF can produce biological damage.
A)True
B)False
Answer: True
To view all questions and flashcards with answers, click on the resource link above.
Page 3

Chapter 2: Wireless LAN Devices and Standards
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20463
Sample Questions
Q1) What is IEEE 802.11n?
Answer: In September of 2004 the IEEE started working on a new standard to significantly increase the bandwidth of today's WLANs. Known as 802.11n, it will set standards for transmissions exceeding 100 Mbps. The 802.11n committee is evaluating over 60 different proposals regarding how to accomplish this. The top speed of the 802.11n standard will be anywhere from 100 Mbps to 500 Mbps, depending on which proposal is approved. Although the final proposal might not be ratified until the year 2006, devices that follow one of the proposed options will appear much earlier than that. This is because there is a significant time lag between the time the final proposal is published and when it is ultimately ratified by the IEEE. This occurred with the 802.11g standard: devices were marketed and sold months before the standard was finally ratified. A WLAN based on one of the 802.11n proposals appeared in mid-2004 under the name "802.11 pre-N".
Q2) Ultimately, who regulates standards that are developed by consortia?
A) a regulatory body
B) the marketplace
C) the government
D) the manufacturers
Answer: B
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: How Wireless Works
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20464
Sample Questions
Q1) Highly-directional antennas are generally concave dish-shaped devices.
A)True
B)False
Answer: True
Q2) When an RF signal moves from one medium to another of a different density the signal actually bends instead of traveling in a straight line. This is known as ____.
A) reflection
B) absorption
C) refraction
D) scattering
Answer: C
Q3) ____ antennas are used for long distance, point-to-point wireless links, such as connecting buildings that are up to 42 kilometers (25 miles) apart.
A) Fresnel
B) Omni-directional
C) Semi-directional
D) Highly-directional
Answer: D
To view all questions and flashcards with answers, click on the resource link above.
5

Chapter 4: IEEE 80211 Physical Layer Standards
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20465
Sample Questions
Q1) The Physical Layer Convergence Procedure (PLCP) standards for 802.11b are based on ____.
A) DSSS
B) FHSS
C) OFDM
D) PYS
Q2) Narrowband transmissions require significant power for the signal to be transmitted because the signal must exceed the ____________________, or the total amount of outside interference, by a substantial margin.
Q3) What are the fields that make up a PLCP frame?
Q4) According to FCC regulations, all FHSS systems in the 900 MHz band must change frequencies through 50 channels and cannot spend more than ____ on one frequency each 20 seconds.
A) 20 milliseconds
B) 30 milliseconds
C) 400 milliseconds
D) 1 second
Q5) What is the Open Systems Interconnection (OSI) reference model?
Q6) What are the advantages to using DSSS with a chipping code?
Q7) There are two disadvantages to using U-NII. What are they?
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: IEEE 80211 Media Access Control and Network Layer Standards
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20466
Sample Questions
Q1) All frames contain the MAC address of the source and destination device, a frame sequence number, and a frame ____ used for error detection.
A) unit
B) flag
C) sum
D) check sequence
Q2) How does open system authentication work?
Q3) What is the first step in shared key authentication?
A) AP encrypts challenge text and sends it to wireless device
B) wireless device encrypts challenge text and sends it to AP
C) AP sends wireless device an authentication frame that contains a block of text known as the challenge text
D) wireless device sends an authentication frame to the AP
Q4) CSMA/CA reduces collisions is by using explicit frame acknowledgment. Describe how frame acknowledgment works.
Q5) What fields are contained in the body of a beacon frame?
Q6) A wireless device sends an authentication frame to the AP. The AP sends back an authentication frame that contains a block of text known as the
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Planning and Deploying a Wireless LAN
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20467
Sample Questions
Q1) What should you do when electrical alternating current power is not available near the AP location?
A) move it to another location
B) use wireless power
C) use a battery
D) user Power over Ethernet
Q2) Two significant changes in the business world have occurred in the last 15 years. What are they?
Q3) Two adjacent access points that use the same ____ can cause interference and lost frames.
A) station
B) channel
C) hotspot
D) ESS
Q4) ____ should be considered when calculating ROI.
A) Customer satisfaction
B) Implementation costs
C) Training
D) All of the above
Q5) What is the final step in the wireless LAN model developed by Intel Corporation?
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Conducting a Site Survey
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20468
Sample Questions
Q1) What are the steps involved in gathering data for a site survey?
Q2) How is RF information actually (physically) collected?
Q3) What should be included in a site survey report?
Q4) What should you be sure to do when collecting RF information?
A) take pictures of your location as you move around
B) connect to the Internet and download a file to test bandwidth
C) write down your perception of connection speed
D) observe the data being displayed by the software measurement tools
Q5) What is a drawback of a spectrum analyzer?
A) information is displayed in graphical form and not as raw data
B) information is displayed as raw data, not in graphical form
C) information only applies to one frequency
D) only made by a single manufacturer and very expensive
Q6) The ____ setting of a site survey analyzer specifies the AP that will be involved in the test.
A) Destination MAC Address
B) Continuous Link Test
C) Packet Tx Type
D) Delay Between Packets
Q7) What is a site survey analyzer?
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Wireless LAN Security and Vulnerabilities
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20469
Sample Questions
Q1) Briefly describe cryptography and discuss its history.
Q2) A ____ is not malicious but often seeks to expose security flaws.
A) cracker
B) script kiddie
C) spy
D) hacker
Q3) Employees pose only a small threat to networks.
A)True
B)False
Q4) Describe the five steps in the process of WEP encryption.
Q5) In a(n) ____________________ attack, an attacker attempts to create every possible key combination by using a program to systematically change one character at a time in a possible default key, and then using each newly generated key to decrypt a message.
Q6) While most attacks take advantage of vulnerabilities that someone has already uncovered, a(n) ____________________ attack occurs when an attacker discovers and exploits a previously unknown flaw.
Q7) Describe at least four weaknesses of open system authentication.
Page 10
Q8) Describe a man-in-the-middle attack.
Q9) Briefly describe the goal of InfraGard.
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Implementing Wireless Lan Security
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20470
Sample Questions
Q1) Most consumer access points are in reality wireless ____________________, because they combine the functions of an access point, router, network address translator, firewall, and switch.
Q2) What feature of IEEE 802.11i allows a device to become authenticated to an AP before moving to it?
A) key caching
B) port security
C) pre-authentication
D) message passing
Q3) What is a wireless gateway?
Q4) ____ was designed to address WEP vulnerabilities with a minimum of inconvenience.
A) IEEE 802.11i
B) TGi
C) dynamic WEP
D) WPA
Q5) Describe Advanced Encryption Standard (AES).
Q6) In WPA, ________________________________________ encryption replaces WEP's small 40-bit encryption key that must be manually entered on wireless APs and devices and does not change.
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Managing a Wireless LAN
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20471
Sample Questions
Q1) The first step in creating a security policy is ____.
A) risk assessment
B) security auditing
C) impact analysis
D) documentation
Q2) Many enterprise-level access points provide utilities that offer three types of information. What are they?
Q3) A(n) ____ amplifier boosts the RF signal before it is injected into the device that contains the antenna.
A) bidirectional
B) pre-injection
C) unidirectional
D) internal
Q4) It is important for wireless system administrators to maintain a(n) ____ log that contains a record of all problems, solutions, and configuration changes.
A) manual
B) event
C) network
D) AP
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 11: Network Settings and Wireless LAN
Troubleshooting
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20472
Sample Questions
Q1) When using WEP as part of the transitional security model, the same ____ key must be installed on the access point and the device. If not the wireless device may not operate properly.
A) secure
B) linked
C) shared
D) private
Q2) Devices using ____ may cause all-band interference.
A) Mobile IP
B) WEP
C) frequency hopping spread spectrum
D) IEEE 802.11g
Q3) Some computer viruses are known to cause ____.
A) duplicate SSID
B) incorrect MAC addresses
C) WLAN interference
D) intermittent connectivity problems for wireless connections
Q4) How would you solve a near/far transmission problem?
Page 14
Q5) Describe the LED indicator lights that appear on an AP.
Q6) What are some of the factors that influence system throughput?
To view all questions and flashcards with answers, click on the resource link above.
Page 15
Chapter 12: Personal, Metropolitan, and Wide Area Wireless
Networks
Available Study Resources on Quizplus for this Chatper
41 Verified Questions
41 Flashcards
Source URL: https://quizplus.com/quiz/20473
Sample Questions
Q1) Power consumption is so low for 802.15.4 devices that it is estimated that batteries powering the devices can last up to ____.
A) 4 months
B) 1 year
C) 2 years
D) 5 years
Q2) The ZigBee group has drafted standards relating to network configuration, security, and other higher-level features that are not covered by the IEEE 802.15.4 standard.
A)True
B)False
Q3) Describe the last mile connection problem.
Q4) ____ is another name for IEEE 802.15.3a.
A) Megaband
B) Bluetooth
C) Ultrawideband
D) Broadband
Q5) Describe the way cellular telephone networks work.
Q6) What is a piconet?

16
Q7) What are the two different types of RFID tags?
To view all questions and flashcards with answers, click on the resource link above.