MikroTik Certified Enterprise Wireless Engineer (MTCEWE)
1 Introduction to MikroTik Enterprise Wireless
2 Wireless Networking Fundamentals
1 Radio Frequency (RF) Basics
2 Wireless Standards and Protocols
3 Wireless Network Topologies
3 MikroTik Wireless Products
1 Overview of MikroTik Wireless Devices
2 MikroTik Wireless Access Points (APs)
3 MikroTik Wireless Routers
4 MikroTik Wireless Bridges
4 MikroTik Wireless Configuration
1 Basic Wireless Configuration
2 Advanced Wireless Configuration
3 Wireless Security Settings
4 Wireless Quality of Service (QoS)
5 MikroTik Wireless Management
1 Centralized Wireless Management
2 Wireless Site Surveys
3 Wireless Performance Monitoring
4 Wireless Troubleshooting
6 MikroTik Wireless Security
1 Wireless Encryption Protocols
2 Wireless Authentication Methods
3 Wireless Intrusion Detection and Prevention
4 Wireless Security Best Practices
7 MikroTik Wireless Integration
1 Integrating MikroTik Wireless with Other Networks
2 Wireless Mesh Networks
3 Wireless Guest Networks
4 Wireless IoT Integration
8 MikroTik Wireless Deployment Scenarios
1 Small OfficeHome Office (SOHO) Wireless Deployment
2 Enterprise Wireless Deployment
3 Outdoor Wireless Deployment
4 Wireless Hotspot Deployment
9 MikroTik Wireless Troubleshooting
1 Common Wireless Issues
2 Wireless Troubleshooting Tools
3 Wireless Performance Optimization
4 Wireless Interference Mitigation
10 MikroTik Wireless Certification Exam Preparation
1 Exam Objectives and Structure
2 Sample Exam Questions
3 Study Resources and Tips
4 Certification Exam Registration and Scheduling
Sample Exam Questions for MikroTik Certified Enterprise Wireless Engineer (MTCEWE)

Sample Exam Questions for MikroTik Certified Enterprise Wireless Engineer (MTCEWE)

Question 1: Wireless Network Design

You are tasked with designing a wireless network for a small office with 50 employees. The office spans across two floors, each approximately 1000 square feet. The building has concrete walls and metal doors. What factors would you consider in selecting the number and placement of access points (APs)?

Key Concepts:

Explanation:

When designing a wireless network for a small office, the first step is to assess the coverage area. Each floor of 1000 square feet will require at least one AP to ensure adequate coverage. However, due to the presence of concrete walls and metal doors, which can significantly reduce signal strength, additional APs may be necessary to ensure seamless coverage.

Next, consider the number of users. With 50 employees, the network must support a relatively high number of concurrent connections. This means that the APs should be capable of handling the expected load without degradation in performance.

Finally, evaluate the bandwidth requirements. If the office frequently uses applications that require high bandwidth, such as video conferencing or large file transfers, the APs should be capable of delivering sufficient throughput to meet these demands.

Example:

For this office, you might place two APs on each floor, one in the central area and one near the edges to ensure coverage even in areas with significant obstructions. This setup ensures that the wireless signal can penetrate the concrete walls and metal doors, providing reliable coverage throughout the office.

Question 2: Wireless Security

You have been asked to secure a MikroTik wireless network for a small retail store. The store has 20 employees and provides Wi-Fi access to customers. What security measures would you implement to protect the network from unauthorized access and potential threats?

Key Concepts:

Explanation:

To secure the MikroTik wireless network, start by implementing strong encryption protocols. WPA3 is the latest and most secure standard, offering robust protection against brute-force attacks and other vulnerabilities. Ensure that both the employee and guest networks use WPA3 encryption.

Next, implement access control measures. For the employee network, use RADIUS authentication to ensure that only authorized users can access the network. Additionally, consider using MAC address filtering to further restrict access to known devices.

For the guest network, set up a separate SSID with limited access to the internet. This ensures that customers can access the internet without compromising the security of the internal network. Use firewall rules to control traffic between the guest and employee networks, preventing unauthorized access.

Example:

For the employee network, configure WPA3 encryption and RADIUS authentication. Use MAC address filtering to allow only specific devices to connect. For the guest network, set up a separate SSID with WPA3 encryption and limited access to the internet. Configure firewall rules to block any attempts to access the employee network from the guest network, ensuring a secure environment for both employees and customers.