Test your basic knowledge |

Wireless Certification

Instructions:
  • Answer 40 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The range of RF transmissions increases with greater transmitting ____ - not frequency.






2. The two RF spread spectrum technologies in the IEEE 802.11 standard is FHSS and ____.






3. Bluetooth uses a type of data modulation called ____.






4. DSSS uses channels that are ___ MHz wide to transmit data in the 2.4 GHz ISM band.






5. The 802.11 standard contains 2.4 GHz FHSS - 2.4 GHz DSSS - and ____.






6. All access points transmit a ____ management frame at a fixed interval.






7. The weather and future ____ should be considered when erecting a 2.4GHz WLAN outside antenna.






8. ____ is the data modulation method used in FHSS.






9. An ____ is a set of one or more interconnected BSSs and integrated local area networks (LANs) that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs.






10. Insertion loss on WLAN splitters are measured in what units?






11. Before going to sleep - a wireless station must notify the ____ of its intention to sleep.






12. In Infrastructure mode a single access point (AP) together with all associated stations (STAs) is called a ____.






13. The Fresnel Zone must be at least __% cleared of obstructions.






14. Dipole antennas are ____-directional antennas.






15. DSSS systems support a maximum of __ APs in a co-located environment.






16. MAC filters can be implemented on a WLAN on an ____ point or on a RADIUS server.






17. Part of the roaming process involves Implementing Mobile IP - Active Scanning - and ____ Scanning.






18. The FCC deals with RF Output power limits - appropriate RF Frequency band use - and ____ of frequency bands.






19. WLAN client-side devices use the security features EAP and ____.






20. On August 31 - 2000 - the FCC mandated that FHSS systems using fewer than 75 hops must have a maximum power output of ___ mW.






21. To achieve 54 Mbps - 802.11a uses which type of data modulation?






22. Yagi and Patch antennas are examples of ____-directional antennas.






23. WEP keys are also known as ____ Secrets.






24. A sequence of hops in a FHSS system is referred to as a ____.






25. A loss of -10dB yields a power ratio of ____.






26. With 802.11 it is possible to create an ad-hoc network of client devices without a controlling Access Point called an ____ - in which case the SSID is chosen by the client device that starts the network - and broadcasting of the SSID is performed in






27. The units for relative power are dB and dB_.






28. Beacon frames are used for ____ synchronization and passing channel selection information.






29. The two types of WLAN scanning are active scanning and ____ scanning.






30. The FHSS hopset can be determined by listening to traffic on each of the hopping ____.






31. ____ System Authentication is a secure method of client device authentication onto a WLAN.






32. The spread spectrum FHSS exhibits resistance to narrowband __ interference by design.






33. Body of water - flat stretch of earth - and metal roofs are considered to be smooth surfaces that can cause ____path.






34. A parabolic ____ is one type of a highly directional antenna.






35. A change in the direction and intensity of a group of waves after passing by an obstacle or the bending of waves around an object is referred to as ____.






36. A gain of +3dB yieds a power ratio of __.






37. The ____ node problem can be caused by interfering obstacles between clients.






38. Antenna diversity compensates for a wireless LAN problem called ____.






39. T/F FHSS is inherently more secure than DSSS.






40. Data modulation methods in DSSS systems are BPSK and ____.