The following activities provide practice with the topics introduced in this chapter.
Labs
Lab—Configure a Wireless Router and Client (13.5.5)
Check Your Understanding Questions
Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. Appendix A, “Answers to the ‘Check Your Understanding‛ Questions,” lists the answers.
1. Which statements characterize wireless network security? (Choose two.)
- Wireless guest mode provides open access to a protected LAN.
- With SSID broadcast disabled, an attacker must know the SSID to connect.
- An attacker needs physical access to at least one network device to launch an attack.
- Wireless networks offer the same security features as wired networks offer.
- Using the default IP address on an access point makes hacking easier.
2. Which type of network technology is used for low-speed communication between peripheral devices?
- 802.11
- Bluetooth
- Channels
- Ethernet
3. What radio frequency bands are used in home wireless LANs? (Choose two.)
- 9 MHz
- 5 GHz
- 2.4 GHz
- 900 GHz
- 5 MHz
4. A student is attempting to access an 802.11n wireless network. What method is used to manage contention-based access on this wireless network?
- Priority ordering
- Token passing
- CSMA/CD
- CSMA/CA
5. What type of user end device is commonly connected to the Ethernet ports on a home wireless router?
- Desktop computer
- DSL modem
- Wireless antenna
- Cable modem
6. What purpose would a home user have for implementing Wi-Fi?
- To connect wireless headphones to a mobile device
- To create a wireless network usable by other devices
- To hear various radio stations
- To connect a keyboard to a PC
7. Which type of wireless communication is based on 802.11 standards?
- Cellular LAN
- Infrared
- Wi-Fi
- Bluetooth
8. During the optional reservation process, what does the client send to the AP to reserve a channel?
- Request to Send
- Acknowledgment
- Clear to Send
- Request to Connect
9. What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet?
- Authentication
- Guest SSID
- Encryption
- MAC address filtering