Test your basic knowledge |

Wireless Certification

Instructions:
  • Answer 40 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. DSSS uses channels that are ___ MHz wide to transmit data in the 2.4 GHz ISM band.






2. Part of the roaming process involves Implementing Mobile IP - Active Scanning - and ____ Scanning.






3. ____ is the data modulation method used in FHSS.






4. With 802.11 it is possible to create an ad-hoc network of client devices without a controlling Access Point called an ____ - in which case the SSID is chosen by the client device that starts the network - and broadcasting of the SSID is performed in






5. The two types of WLAN scanning are active scanning and ____ scanning.






6. A gain of +3dB yieds a power ratio of __.






7. T/F FHSS is inherently more secure than DSSS.






8. Insertion loss on WLAN splitters are measured in what units?






9. MAC filters can be implemented on a WLAN on an ____ point or on a RADIUS server.






10. Yagi and Patch antennas are examples of ____-directional antennas.






11. A sequence of hops in a FHSS system is referred to as a ____.






12. The Fresnel Zone must be at least __% cleared of obstructions.






13. The weather and future ____ should be considered when erecting a 2.4GHz WLAN outside antenna.






14. The FHSS hopset can be determined by listening to traffic on each of the hopping ____.






15. The ____ node problem can be caused by interfering obstacles between clients.






16. Antenna diversity compensates for a wireless LAN problem called ____.






17. DSSS systems support a maximum of __ APs in a co-located environment.






18. In Infrastructure mode a single access point (AP) together with all associated stations (STAs) is called a ____.






19. The 802.11 standard contains 2.4 GHz FHSS - 2.4 GHz DSSS - and ____.






20. ____ System Authentication is a secure method of client device authentication onto a WLAN.






21. The range of RF transmissions increases with greater transmitting ____ - not frequency.






22. The two RF spread spectrum technologies in the IEEE 802.11 standard is FHSS and ____.






23. To achieve 54 Mbps - 802.11a uses which type of data modulation?






24. The units for relative power are dB and dB_.






25. On August 31 - 2000 - the FCC mandated that FHSS systems using fewer than 75 hops must have a maximum power output of ___ mW.






26. Bluetooth uses a type of data modulation called ____.






27. Before going to sleep - a wireless station must notify the ____ of its intention to sleep.






28. A loss of -10dB yields a power ratio of ____.






29. An ____ is a set of one or more interconnected BSSs and integrated local area networks (LANs) that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs.






30. WLAN client-side devices use the security features EAP and ____.






31. Beacon frames are used for ____ synchronization and passing channel selection information.






32. A parabolic ____ is one type of a highly directional antenna.






33. Body of water - flat stretch of earth - and metal roofs are considered to be smooth surfaces that can cause ____path.






34. All access points transmit a ____ management frame at a fixed interval.






35. WEP keys are also known as ____ Secrets.






36. The spread spectrum FHSS exhibits resistance to narrowband __ interference by design.






37. Data modulation methods in DSSS systems are BPSK and ____.






38. Dipole antennas are ____-directional antennas.






39. A change in the direction and intensity of a group of waves after passing by an obstacle or the bending of waves around an object is referred to as ____.






40. The FCC deals with RF Output power limits - appropriate RF Frequency band use - and ____ of frequency bands.