____________________________ Name ____________________________ Date CCNA DISCOVERY 1 MODULE 7 – WIRELESS TECHNOLOGIES STUDY GUIDE 7.1.1 Client/Server Relationships 1. What do wireless technologies use to carry information between devices? 2. What are the most common wave lengths used for public wireless communication? 3. Which wavelength is relatively low energy and cannot penetrate through walls or other obstacles? 4. Which wavelength has the greatest range? 5. What ranges can be used with very few restrictions? 6. What are the ranges with the fewest restrictions called? 7. What has made Bluetooth technology the preferred method for connection computer peripherals? 7.1.1.4 Activity 7.1.2 Benefits and Limitations of Wireless Technology 8. What is one of the main advantages of wireless technology? 9. What is a hotspot? 10. What are the benefits of wireless LAN technology? 11. What are the limitations of wireless LAN technology? CCNA Discovery 1 Mod 7 Study Guide Page 1 12. What two techniques have been developed to help secure wireless transmissions? 7.1.3 Types of Wireless Networks and Their Boundaries 13. What are the three major categories of wireless networks? 14. 15. What is the smallest wireless network, which is used to connect various peripheral devices? What does an access point do? 16. What technologies does the WWAN use? 17. What is a good example of a WWAN? 7.1.3.3 Activity 7.2.1 Wireless LAN Standards 18. What do wireless standards ensure? 19. 20. What is the main organization responsible for the creation of wireless technical standards? What IEEE standard governs the WLAN environment? 21. What are the current standards for the WLAN environment? 22. What organization is responsible for testing wireless LAN devices from different manufacturers? What does the Wi-Fi logo on a device mean? 23. 7.2.1.2 24. Complete the Common IEEE WLAN Standards Chart 7.2.2 Wireless LAN Components CCNA Discovery 1 Mod 7 Study Guide Page 2 25. What is a STA? 26. What do antennas do? 27. What is an increase in signal strength from an antenna known as? How are antenna classified? 28. 29. 30. What is the difference between a directional antenna and an omnidirectional antenna? Which antenna type can achieve greater transmission distances? 7.2.2.3 Activity 7.2.3 WLANS and the SSID 31. How do you ensure that wireless components connect to the appropriate WLAN? 32. What is a case-sensitive, alphanumeric string that can be up to 32 characters? 33. What is the SSID used for? 7.2.3 34. What are the two basic forms of WLAN installations? 35. What is the simplest form of a wireless network? 36. How is an ad-hoc network created? 37. What is the mode of wireless communication most often used in the home and business environment? CCNA Discovery 1 Mod 7 Study Guide Page 3 38. 39. What controls all communications and ensures that all STAs have equal access to the media on infrastructure mode? What is the area covered by a single access point known as? 40. What is the smallest building block of a WLAN? 41. What is an Extended Service Set (ESS)? 42. In order to allow movement between the cells without the loss of signal, how much must BSS’s overlap? 7.2.3.4 Activity 7.2.4 Wireless Channels 43. How are the conversations between sender and receiver controlled? 44. What does Wireless technology use to avoid collisions? 45. What is a CTS (Clear to Send)? 46. What is an ACK (acknowledgement)? 47. Who receives the ACK? 7.2.4.3 Activity 7.2.5 Configuring the Access Point 48. When should basic configuration tasks be conducted? 49. 50. What does the type of mode enabled on the access point depend on? What happens if you select mixed mode? CCNA Discovery 1 Mod 7 Study Guide Page 4 51. What must adjacent BSSs use in order to optimize throughput? 7.2.5.3 Lab Activity 7.2.6 Configuring the Wireless Client 52. What is a wireless host? 53. 54. 55. 56. 57. 58. What is basic management software that can control most wireless client configurations? What are some of the features available with stand-alone wireless utility software? Is it possible for wireless utility software and Windows XP client software to manage the wireless connection at the same time What feature displays the current signal strength and quality of the wireless signal? What is one of the most common tests for verifying successful data transmission? What does a successful ping tell you? 7.2.6.4 Lab Activity 7.3.1 Why People Attach WLANS 59. What is one of the primary benefits of wireless networking? 60. What is one easy way to gain entry to a wireless network? 61. How can you make the network non-public? 62. Why should you change the default settings? 7.3.2 Limiting Access to a WLAN 63. What is one way to limit access to your wireless network? CCNA Discovery 1 Mod 7 Study Guide Page 5 64. What is MAC address filtering? 65. What happens if the MAC address is not located in the database? 7.3.3 Authentication of a WLAN 66. What is authentication? 67. What is the most common form of authentication? 68. What are the three types of wireless authentication methods? 69. What is open authentication? 70. What is PSK (pre-shared key) authentication? 71. What is EAP (Extensible Authentication Protocol)? 72. If MAC address filtering and authentication are enabled, which occurs first? 7.3.4 Encryption of a WLAN 73. What is encryption? 74. What is WEP (Wired Equivalency Protocol)? 75. How big is the WEP key? 76. What is a passphrase? 77. How is WPA (Wi-Fi Protected Access) different than WEP? CCNA Discovery 1 Mod 7 Study Guide Page 6 78. Why is WPA considered more secure than WEP? 7.3.4.3 Activity 7.3.5 Traffic Filtering on a WLAN 79. What is traffic filtering? 7.3.5.2 Lab Activity 7.4. Configuring an Integrated AP & Wireless Client 7.4.1 Planning the WLAN 80. What things should be included when planning a network installation? 81. What are the most common factors to consider when determining which WLAN standards to use? 82. What is the best way to learn enduser requirements? 83. Which wireless standard supports a larger BBS? 84. What is a benefit of a larger BBS? 85. What is Total Cost of Ownership (TCO)? 7.4.2 Installing and Security The Access Point 86. What are some of the more basic security measures? 7.4.3 Backing Up and Restoring Configuration Files 87. What are the two ways to restore factory defaults? 7.4.3.2 Activity 7.4.4 Updating the Firmware 88. Where is the operating system on most integrated routers stored? CCNA Discovery 1 Mod 7 Study Guide Page 7 89. 90. If the update process is interrupted before completion, what happens to the drive? What is the process of updating firmware on an integrated router? 7.4.4.2 Activity 7.6.1.1 Quiz CCNA Discovery 1 Mod 7 Study Guide Page 8