From chapter 1 of The Certified Wireless Network Administrator's Study Guide, I have learned the history of wireless networking and the roles and responsibilities of key organizations involved with the wireless networking industry such as:
The book also provided a basic understanding of the relationship between networking fundamentals and 802.11 technologies. the concepts are discussed in OSI model, Core, Distribution, and access section.
I've also learned how wireless stations transmit and receive data and some of the components of waves and modulation:
Chapter 1
Review Questions
1. 802.11 technology is typically deployed at which fundamental layer of network architecture?
A. Core
B. Distribution
C. Access
D. Network
2. Which organization is responsible for enforcing maximum transmit power rules in an unlicensed frequency band?
A. IEEE
B. Wi-Fi Alliance
C. ISO
D. IETF
E. None of the above
3. 802.11 wireless bridge links are typically associated with which network architecture layer?
A. Core
B. Distribution
C. Access
D. Network
4. The 802.11-2012 standard was created by which organization?
A. IEEE
B. OSI
C. ISO
D. Wi-Fi Alliance
E. FCC
5. What organization ensures interoperability of WLAN products?
A. IEEE
B. ITU-R
C. ISO
D. Wi-Fi Alliance
E. FCC
6. What type of signal is required to carry data?
A. Communications signal
B. Data signal
C. Carrier signal
D. Binary signal
E. Digital signal
7. Which keying method is most susceptible to interference from noise?
A. FSK
B. ASK
C. PSK
D. DSK
8. Which sublayer of the OSI model's Data-Link layer is used for communication between 802.11 radios?
A. LLC
B. WPA
C. MAC
D. FSK
9. While performing some research, Janie comes across a reference to a document titled RFC 3935. Which of the following organization's website would be best to further research this document?
A. IEEE
B. Wi-Fi Alliance
C. WECA
D. FCC
E. IETF
10. The Wi-Fi Alliance is responsible for which of the following certification programs?
A. 802.11i
B. WEP
C. 802.11-2012
D. WMM
E. PSK
11. Which wave properties can be modulated to encode data? (Choose all that apply.)
A. Amplitude
B. Frequency
C. Phase
D. Wavelength
12. The IEEE 802.11-2012 standard defines communication mechanisms at which layers of the OSI model? (Choose all that apply.)
A. Network
B. Physical
C. Transport
D. Application
E. Data-Link
F. Session
13. The height or power of a wave is known as what?
A. Phase
B. Frequency
C. Amplitude
D. Wavelength
19. What are the advantages of using unlicensed frequency bands for RF transmissions? (Choose all that apply.)
A. There are no government regulations.
B. There is no additional financial cost.
C. Anyone can use the frequency band.
D. There are no rules.
20. The OSI model consists of how many layers?
A. Four
B. Six
C. Seven
D. Nine
Chapter 2 Review Questions
2. What term best defines the linear distance traveled in one positive-to-negative-to-positive oscillation of an electromagnetic signal?
A. Crest
B. Frequency
C. Trough
D. Wavelength
4. A standard measurement of frequency is called what?
A. Hertz
B. Milliwatt
C. Nanosecond
D. Decibel
E. K-factor
5. When an RF signal bends around an object, this propagation behavior is known as what?
A. Stratification
B. Refraction
C. Scattering
D. Diffraction
E. Attenuation
6. When the multiple RF signals arrive at a receiver at the same time and are with the primary wave, the result can be of the primary signal.
A. out of phase, scattering
B. in phase, intersymbol interference
C. in phase, attenuation
D. 180 degrees out of phase, amplification
E. in phase, cancellation
F. 180 degrees out of phase, cancellation
7. Which of the following statements are true? (Choose all that apply.)
A. When upfade occurs, the final received signal will be stronger than the original transmitted signal.
B. When downfade occurs, the final received signal will never be stronger than the original transmitted signal.
C. When upfade occurs, the final received signal will never be stronger than the original transmitted signal.
D. When downfade occurs, the final received signal will be stronger than the original transmitted signal.
8. What is the frequency of an RF signal that cycles 2.4 million times per second?
A. 2.4 hertz
B. 2.4 MHz
C. 2.4 GHz
D. 2.4 kilohertz
E. 2.4 KHz
9. What is the best example of a time domain tool that could be used by an RF engineer?
A. Oscilloscope
B. Spectroscope
C. Spectrum analyzer
D. Refractivity gastroscope
12. Which behavior can be described as an RF signal encountering a chain link fence, causing the signal to bounce into multiple directions?
A. Diffraction
B. Scatter
C. Reflection
D. Refraction
E. Multiplexing
15. Which of the following statements are true about free space path loss? (Choose all that apply.)
A. RF signals will attenuate as they travel, despite the lack of attenuation caused by obstructions.
B. Path loss occurs at a constant linear rate.
C. Attenuation is caused by obstructions.
D. Path loss occurs at a logarithmic rate.
17. What is an example of a frequency domain tool that could be used by an RF engineer?
A. Oscilloscope
B. Spectroscope
C. Spectrum analyzer
D. Refractivity gastroscope
18. Using knowledge of RF characteristics and behaviors, which two options should a WLAN engineer be most concerned about during an indoor site survey? (Choose all that apply.)
A. Brick walls
B. Indoor temperature
C. Wood-lath plaster walls
D. Drywall
19. Which three properties are interrelated?
A. Frequency, wavelength, and the speed of light
B. Frequency, amplitude, and the speed of light
C. Frequency, phase, and amplitude
D. Amplitude, phase, and the speed of sound
20. Which RF behavior best describes a signal striking a medium and bending in a different direction?
A. Refraction
B. Scattering
C. Diffusion
D. Diffraction
E. Microwave reflection
Chapter 5 Review Questions
5. A robust security network (RSN) requires the use of which security mechanisms? (Choose all that apply.)
A. 802.11x
B. WEP
C. IPsec
D. CCMP/AES
E. CKIP
F. 802.1X
D and F. The required encryption method defined by an RSN wireless network (802.11i) is Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP), which uses the Advanced Encryption Standard (AES) algorithm. An optional choice of encryption is the Temporal Key Integrity Protocol (TKIP). The 802.11i amendment also requires the use of an 802.1X/EAP authentication solution or the use of preshared keys.
6. An 802.11a radio card can transmit on the frequency and uses spread spectrum technology.
A. 5 MHz, OFDM
B. 2.4 GHz, HR-DSSS
C. 2.4 GHz, ERP-OFDM
D. 5 GHz, OFDM
E. 5 GHz, DSSS
D. 802.11a radio cards operate in the 5 GHz Unlicensed National Information Infrastructure (U-NII) 1–3 frequency bands using Orthogonal Frequency Division Multiplexing (OFDM).
10. What is the primary reason that OFDM (802.11a) radios cannot communicate with ERP (802.11g) radios?
A. 802.11a uses OFDM, and 802.11g uses DSSS.
B. 802.11a uses DSSS, and 802.11g uses OFDM.
C. 802.11a uses OFDM, and 802.11g uses CCK.
D. 802.11a operates at 5 GHz, and 802.11g operates at 2.4 GHz.
E. 802.11a requires dynamic frequency selection, and 802.11g does not.
D. Both 802.11a and 802.11g use OFDM technology, but because they operate at different frequencies, they cannot communicate with each other. 802.11a equipment operates in the 5 GHz U-NII bands, whereas 802.11g equipment operates in the 2.4 GHz ISM band.
15. What are the security options available as defined in the original IEEE Std 802.11-1999 (R2003)? (Choose all that apply.)
A. CCMP/AES
B. Open System authentication
C. Preshared keys
D. Shared Key authentication
E. WEP
F. TKIP
B, D and E. The original 802.11 standard defined the use of WEP for encryption. The original 802.11 standard also defined two methods of authentication: Open System authentication and Shared Key authentication.