Page 853 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 853
Written Lab
1. Name the layers of the OSI model and their numbers from top to
bottom.
2. Name three problems with cabling and the methods to counteract
those issues.
3. What are the various technologies employed by wireless devices to
maximize their use of the available radio frequencies?
4. Discuss methods used to secure 802.11 wireless networking.
5. Name the LAN shared media access technologies and examples of
their use, if known.

