Sample Exam Questions for MikroTik Certified Enterprise Wireless Engineer (MTCEWE)
Question 1: Wireless Network Design
You are tasked with designing a wireless network for a small office with 50 employees. The office spans across two floors, each approximately 1000 square feet. The building has concrete walls and metal doors. What factors would you consider in selecting the number and placement of access points (APs)?
Key Concepts:
- Coverage Area: The physical space that needs to be covered by the wireless network. In this case, the office spans two floors, each 1000 square feet.
- Obstructions: Physical barriers like walls, doors, and furniture that can affect wireless signal propagation. Concrete walls and metal doors can significantly attenuate wireless signals.
- Number of Users: The number of users who will be accessing the network simultaneously. Here, there are 50 employees.
- Bandwidth Requirements: The amount of data that users will be transmitting and receiving. This can vary based on the types of applications used (e.g., video conferencing, file transfers).
Explanation:
When designing a wireless network for a small office, the first step is to assess the coverage area. Each floor of 1000 square feet will require at least one AP to ensure adequate coverage. However, due to the presence of concrete walls and metal doors, which can significantly reduce signal strength, additional APs may be necessary to ensure seamless coverage.
Next, consider the number of users. With 50 employees, the network must support a relatively high number of concurrent connections. This means that the APs should be capable of handling the expected load without degradation in performance.
Finally, evaluate the bandwidth requirements. If the office frequently uses applications that require high bandwidth, such as video conferencing or large file transfers, the APs should be capable of delivering sufficient throughput to meet these demands.
Example:
For this office, you might place two APs on each floor, one in the central area and one near the edges to ensure coverage even in areas with significant obstructions. This setup ensures that the wireless signal can penetrate the concrete walls and metal doors, providing reliable coverage throughout the office.
Question 2: Wireless Security
You have been asked to secure a MikroTik wireless network for a small retail store. The store has 20 employees and provides Wi-Fi access to customers. What security measures would you implement to protect the network from unauthorized access and potential threats?
Key Concepts:
- Encryption Protocols: Methods used to encrypt data transmitted over the wireless network to prevent unauthorized access. Common protocols include WPA3, WPA2, and WEP.
- Access Control: Mechanisms to restrict network access to authorized users only. This can include MAC address filtering, RADIUS authentication, and guest network separation.
- Firewall Rules: Rules that control incoming and outgoing network traffic based on predetermined security rules. This helps to block unauthorized access and potential threats.
- Guest Network: A separate network for customers to access the internet without compromising the security of the internal network.
Explanation:
To secure the MikroTik wireless network, start by implementing strong encryption protocols. WPA3 is the latest and most secure standard, offering robust protection against brute-force attacks and other vulnerabilities. Ensure that both the employee and guest networks use WPA3 encryption.
Next, implement access control measures. For the employee network, use RADIUS authentication to ensure that only authorized users can access the network. Additionally, consider using MAC address filtering to further restrict access to known devices.
For the guest network, set up a separate SSID with limited access to the internet. This ensures that customers can access the internet without compromising the security of the internal network. Use firewall rules to control traffic between the guest and employee networks, preventing unauthorized access.
Example:
For the employee network, configure WPA3 encryption and RADIUS authentication. Use MAC address filtering to allow only specific devices to connect. For the guest network, set up a separate SSID with WPA3 encryption and limited access to the internet. Configure firewall rules to block any attempts to access the employee network from the guest network, ensuring a secure environment for both employees and customers.