LAB 4.1-B Tier 1: In-Browser Obj 4.1 · intermediate · ~12min

Wireless Security Configuration

Configure wireless access points for four real-world environments — enterprise, small business, hospital with legacy IoT, and a conference center. Select the correct encryption, authentication, and hardening settings for each scenario.

What You’ll Practice

  • Selecting appropriate wireless encryption protocols (WPA2 vs WPA3, Personal vs Enterprise) based on organizational requirements
  • Matching authentication methods to deployment contexts (RADIUS/EAP-TLS, PSK, captive portals)
  • Identifying which attacks are enabled by specific misconfigurations (KRACK with TKIP, deauth without PMF, WPS brute force)
  • Applying network segmentation and hardening controls to wireless infrastructure

How the Exam Tests This

Objective 4.1 covers applying security techniques to computing resources, and wireless configuration is a core “Given a scenario” topic. The exam presents deployment contexts and asks you to select the correct combination of settings — not just name the protocol. Knowing that WPA3-Enterprise exists isn’t enough; you need to know when it’s the right answer and what breaks when you choose wrong.

Scoring

Each scenario has 3 configuration categories. Each correct selection earns 1 point. Wrong selections show the specific attack vector that choice enables. Scenarios are presented in random order.

MISSION

Four organizations need wireless networks configured. Each has different security requirements, device constraints, and threat profiles. Select the right settings — or learn what attack you just enabled.

SCENARIOS

Enterprise Office
500-employee financial services firm handling sensitive client data.
Small Coffee Shop
Independent coffee shop owner wants secure WiFi for back-office operations (POS system, bookkeeping) and a separate guest network for customers.
Hospital with IoT Devices
Regional hospital deploying wireless IV pumps, patient monitors, and bed sensors.
Conference Center
Convention center hosting a 3-day industry conference for 200 attendees.

HOW IT WORKS

For each scenario, configure 3 settings: encryption, authentication/access, and hardening.

Submit your choices to see per-option feedback. Wrong answers show the specific attack vector that misconfiguration enables.

4 scenarios, 3 choices each = 12 total decisions.