Home > Articles > Cisco Network Technology > Wireless/Optical/High Speed > Wireless LANs: Extending the Reach of a LAN

Wireless LANs: Extending the Reach of a LAN

Chapter Description

This chapter describes the reasons for extending the reach of a LAN and the methods that can be used to do so, with a focus on RF wireless access.

Review Questions

Use the questions here to review what you learned in this chapter. The correct answers can be found in the appendix, "Answers to Chapter Review Questions."

  1. What is the most tangible benefit of wireless implementation?

    1. Cost reduction
    2. Increased mobility
    3. Better productivity
    4. Improved security
  2. What method does a WLAN use to control transmissions?

    1. CSMA/CA (carrier sense multiple access with collision avoidance)
    2. CSMA/CD (carrier sense multiple access collision detect)
    3. CSMA/CR (carrier sense multiple access with collision rejection)
    4. CSMA/CW (carrier sense multiple access with collision weighting)
  3. Match each factor that influences the transmission of radio waves to its correct description.

    • ____ Occurs when RF waves bounce off metal or glass surfaces
    • ____ Occurs when RF waves are soaked up by walls
    • ____ Occurs when RF waves strike an uneven surface and are reflected in many directions
    1. absorption
    2. reflection
    3. scattering
  4. Which regulatory agency controls the 801.11 standard that governs WLANs?

    1. Wi-Fi Alliance
    2. IEEE
    3. EMA
    4. WISC
  5. Which organization offers certification for interoperability among vendors of 802.11 products?

    1. Wi-Fi
    2. IEEE
    3. EMA
    4. WISC
  6. Which two are the unlicensed bands used by WLANs?

    1. 2.4-MHz band
    2. 900-MHz band
    3. 2.4-GHz band
    4. 5-GHz band
    5. 900-GHz band
  7. Which two of the 802.11 standards has the highest possible data rates?

    1. 802.11
    2. 802.11a
    3. 802.11b
    4. 802.11d
    5. 802.11g
  8. Which 802.11 standard transmits using the 5-GHz band?

    1. 802.11
    2. 802.11a
    3. 802.11b
    4. 802.11d
    5. 802.11g
  9. Which is true about the Wi-Fi Alliance organization?

    1. It is a global standards organization that controls the compatibility of Wi-Fi products.
    2. It operates only in the United States and ensures the compatibility of Wi-Fi products.
    3. It is a global, nonprofit industry trade association devoted to promoting the growth and acceptance of wireless LANs.
    4. It is a global, nonprofit industry trade association devoted to promoting the installation of wireless LANs in retail locations.
  10. What is a rogue access point?

    1. An access point that has an open WEP key
    2. An access point that is broadcasting its SSID
    3. An unsecured access point that has been placed on a WLAN
    4. An access point that has had a hardware failure that causes it to endlessly broadcast its SSID
  11. Which three are the steps to secure a WLAN?

    1. Encryption for providing privacy and confidentiality
    2. Authentication to ensure that legitimate clients and users access the network via trusted access points
    3. Controls to transmit power to limit the access point access range to the property boundaries of the parent organization
    4. Protection from security risks and availability with intrusion detection and intrusion protection systems for WLANs
  12. Which standard provides the strongest level of WLAN security?

    1. EAP
    2. WEP
    3. WPA
    4. 802.11i/WPA2
  13. What factor determines which access point a client associates with?

    1. The access point with the lowest SSID
    2. The access point with the highest SSID
    3. The access point whose SSID is received first
    4. The access point that is received with the strongest signal
  14. When you are using 802.11x, how is the client authenticated?

    1. The client is authenticated against a local database stored on the access point.
    2. The access point forwards all network traffic to the server where it is either authenticated or blocked.
    3. The access point encapsulates any 802.1x traffic bound for the authentication server and sends it to the server.
    4. The client encapsulates the 802.1x authentication traffic before sending it to the access point. This causes the access point to forward it to the server.
  15. Which is true when comparing WPA and WPA2?

    1. WPA uses preshared keys whereas WPA 2 uses PSK.
    2. WPA uses EAP authentication whereas WPA 2 uses 802.11x.
    3. WPA uses a Personal Mode whereas WPA 2 uses an Enterprise Mode.
    4. WPA uses TKIP/MIC encryption whereas WPA 2 uses AES-CCMP encryption.
  16. Match each of the following 802.11 topologies to its description.

    • ___ Mobile clients connect directly without an intermediate access point.
    • ___ The communication devices use a single access point for connectivity to each other or to wired network resources.
    • ___ The wireless topology is two or more service sets connected by a distribution system (DS) or, more commonly, a wired infrastructure.
    1. Ad hoc mode
    2. Basic Service Set (BSS)
    3. Extended Services Set (ESS)
  17. What does the physical area of radio frequency coverage provided by an access point define?

    1. The RF service area
    2. The basic service area
    3. The ad hoc service area
    4. The extended services area
  18. When implementing Extended Service Areas, how much overlap is suggested?

    1. 5 to 10 percent
    2. 10 to 15 percent
    3. 15 to 20 percent
    4. 25 to 30 percent
  19. What strategy enables a client to communicate while moving?

    1. The ability to shift data rates
    2. The ability to vary transmit levels
    3. The ability to match the transmit level to the receive level
    4. The ability to perform error correction as the signal level changes
  20. Which three are basic wireless access point parameters?

    1. SSID
    2. Authentication
    3. Data exchange rates
    4. Transmit band selection
    5. RF channel with optional power
  21. When implementing a WLAN, when should you use WEP?

    1. Only if an AAA server is available
    2. When you need the increased security of WEP
    3. When you are planning to enable 802.11x authentication
    4. Only if the hardware equipment does not support WPA
  22. Match the wireless client to its description.

    • ___ Full-featured supplicant for both wired and wireless client
    • ___ Windows operating systems basic wireless supplicant client
    • ___ More advanced wireless client features than those of native operating system
    1. WZC
    2. Cisco Compatible Extensions
    3. Cisco Secure Services Client

Cisco Press Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Cisco Press and its family of brands. I can unsubscribe at any time.