Wireless Security Configuration
Configure wireless access points for four real-world environments — enterprise, small business, hospital with legacy IoT, and a conference center. Select the correct encryption, authentication, and hardening settings for each scenario.
What You’ll Practice
- Selecting appropriate wireless encryption protocols (WPA2 vs WPA3, Personal vs Enterprise) based on organizational requirements
- Matching authentication methods to deployment contexts (RADIUS/EAP-TLS, PSK, captive portals)
- Identifying which attacks are enabled by specific misconfigurations (KRACK with TKIP, deauth without PMF, WPS brute force)
- Applying network segmentation and hardening controls to wireless infrastructure
How the Exam Tests This
Objective 4.1 covers applying security techniques to computing resources, and wireless configuration is a core “Given a scenario” topic. The exam presents deployment contexts and asks you to select the correct combination of settings — not just name the protocol. Knowing that WPA3-Enterprise exists isn’t enough; you need to know when it’s the right answer and what breaks when you choose wrong.
Scoring
Each scenario has 3 configuration categories. Each correct selection earns 1 point. Wrong selections show the specific attack vector that choice enables. Scenarios are presented in random order.
MISSION
Four organizations need wireless networks configured. Each has different security requirements, device constraints, and threat profiles. Select the right settings — or learn what attack you just enabled.
SCENARIOS
HOW IT WORKS
For each scenario, configure 3 settings: encryption, authentication/access, and hardening.
Submit your choices to see per-option feedback. Wrong answers show the specific attack vector that misconfiguration enables.
4 scenarios, 3 choices each = 12 total decisions.