Solutions - LoriMCollier

Mike Meyers’ CompTIA A+  Guide to 802: Managing and Troubleshooting PCs, Fourth Edition
(Exam 220-802)
Chapter 13: Implementing and Troubleshooting Wireless Networks
Answer Key
Key Term Quiz
1. A technology for setting up wireless PANs and connecting to some peripherals is called
Bluetooth.
2. Dipole antennas provide omni-directional signals.
3. Computers are in ad hoc mode when they connect directly together without using a WAP.
4. The amount that an antenna increases a WAP’s radio signal is called gain.
5. You can use MAC address filtering to keep unwanted computers out of your network.
6. If you need share an Internet connection or connect to a wired network through your wireless
network, you would use infrastructure mode.
Multiple-Choice Quiz
1. Two wireless nodes that are communicating directly with each other, without any
intermediary systems or hardware, are using what wireless mode?
A. Ad hoc
B. Bluetooth
C. Infrastructure
D. 802.11
Answer: A
2. What security feature limits which PCs can access a wireless network based on their NICs’
hard-coded addresses?
A. WPA
B. SSID
C. MAC filtering
Copyright © 2013 by The McGraw-Hill Companies.
page 1
Mike Meyers’ CompTIA A+  Guide to 802: Managing and Troubleshooting PCs, Fourth Edition
(Exam 220-802)
D. WEP filtering
Answer: C
3. How do you install and configure most cellular WAN cards?
A. Plug the card into a USB port and then follow the onscreen instructions.
B. Set up CMOS to enable cellular WAN and then install the card into a PCIe slot.
C. Plug the card into a USB port and enter your IP and cellular account information.
D. Plug the card into an eSATA port and follow the onscreen instructions.
Answer: A
4. What are the two ways you can set up WPA/WPA2? (Select two.)
A. PSK
B. WEP
C. Enterprise
D. Administrator
Answer: A, C
5. What can limit wireless connectivity to a list of accepted users based on the hard-wired
address of their wireless NIC?
A. Encryption
B. MAC filtering
C. NWLink
D. WEP
Answer: B
6. What tool can you use to find available wireless networks?
A. WAP
B. Wireless Detection System
Copyright © 2013 by The McGraw-Hill Companies.
page 2
Mike Meyers’ CompTIA A+  Guide to 802: Managing and Troubleshooting PCs, Fourth Edition
(Exam 220-802)
C. MAC locator
D. Wireless locator
Answer: D
7. Which of these Wi-Fi security protocols is the least secure and is easily hacked?
A. WEP
B. WAP
C. WINS
D. WPA2
Answer: A
8. What is a cheap and easy way to extend the range of a WAP?
A. Upgrade the antenna.
B. Buy a WAP that advertises a longer range.
C. You can’t easily boost range.
D. Upgrade the wireless NICs.
Answer: A
9. What is the technical name of a wireless network?
A. SSID
B. BSSID
C. SSD
D. WPA
Answer: A
10. Which of the following devices is a major source of interference for Wi-Fi networks?
A. Cell phones
B. Small FM radio transmitters
Copyright © 2013 by The McGraw-Hill Companies.
page 3
Mike Meyers’ CompTIA A+  Guide to 802: Managing and Troubleshooting PCs, Fourth Edition
(Exam 220-802)
C. Microwaves
D. Fluorescent lights
Answer: C
Essay Quiz
1. You purchased a new WAP, but its range just isn’t cutting the mustard. Do some research on
the available types of upgrade antennas for WAPs and write a short paragraph about the
different options.
Answer: A good answer will compare the different antenna options available, such as omnidirectional antennas vs. directional antennas. The student should also discuss various antenna
designs, such as Yagi, dipole, and parabolic antennas.
2. Write a short memo about the various security options when setting up a wireless network.
Remember: there’s more to security than just setting up encryption!
Answer: A good answer will not only consider the merits of wireless encryption, but will
also discuss secondary security measures such as disabling SSID broadcasting and enabling
MAC address filtering.
3. Prepare a short memo to your instructor (or friend) that outlines the basic differences
between WEP and WPA encryption methods. Use any standard memo format you are
familiar with. Include a company or school logo on the top of the page to make the memo
appear to be printed on company stationery (or “letterhead”).
Answer: The student should provide details about the two encryption standards, such as how
they’re implemented and the level of encryption. A good answer would discuss the relative
security of the two.
Copyright © 2013 by The McGraw-Hill Companies.
page 4