SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Certification
Start Test
Study First
Subjects
:
it-skills
,
certifications
Instructions:
Answer 40 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The two types of WLAN scanning are active scanning and ____ scanning.
omni
power
Passive
i
2. The Fresnel Zone must be at least __% cleared of obstructions.
60
hidden
dish
power
3. The 802.11 standard contains 2.4 GHz FHSS - 2.4 GHz DSSS - and ____.
QPSK
infrared
Open
RF
4. Insertion loss on WLAN splitters are measured in what units?
3
Passive
dB
Access
5. All access points transmit a ____ management frame at a fixed interval.
Beacon
64QAM
DSSS
RF
6. The FHSS hopset can be determined by listening to traffic on each of the hopping ____.
Time
Channels
Channel
False
7. The spread spectrum FHSS exhibits resistance to narrowband __ interference by design.
Multipath
Passive
RF
Passive
8. Bluetooth uses a type of data modulation called ____.
Open
GFSK
False
3
9. Yagi and Patch antennas are examples of ____-directional antennas.
Time
dB
semi
Passive
10. Body of water - flat stretch of earth - and metal roofs are considered to be smooth surfaces that can cause ____path.
Multipath
Shared
semi
dish
11. To achieve 54 Mbps - 802.11a uses which type of data modulation?
Open
64QAM
Multipath
Shared
12. A change in the direction and intensity of a group of waves after passing by an obstacle or the bending of waves around an object is referred to as ____.
LEAP
Diffraction
DSSS
Shared
13. A gain of +3dB yieds a power ratio of __.
LEAP
2:1
Beacon
semi
14. T/F FHSS is inherently more secure than DSSS.
False
22
Diffraction
LEAP
15. The two RF spread spectrum technologies in the IEEE 802.11 standard is FHSS and ____.
Channels
Time
DSSS
LEAP
16. With 802.11 it is possible to create an ad-hoc network of client devices without a controlling Access Point called an ____ - in which case the SSID is chosen by the client device that starts the network - and broadcasting of the SSID is performed in
dish
BSS
DSSS
IBSS (Independent Basic Service Set)
17. DSSS systems support a maximum of __ APs in a co-located environment.
LEAP
obstructions
3
DSSS
18. The units for relative power are dB and dB_.
GFSK
i
RF
1:10
19. Beacon frames are used for ____ synchronization and passing channel selection information.
125
60
22
Time
20. WEP keys are also known as ____ Secrets.
False
Shared
BSS
RF
21. Before going to sleep - a wireless station must notify the ____ of its intention to sleep.
licensing
AP
Channels
Access
22. The range of RF transmissions increases with greater transmitting ____ - not frequency.
22
licensing
False
power
23. The FCC deals with RF Output power limits - appropriate RF Frequency band use - and ____ of frequency bands.
power
licensing
Multipath
GFSK
24. The weather and future ____ should be considered when erecting a 2.4GHz WLAN outside antenna.
omni
RF
obstructions
hidden
25. A sequence of hops in a FHSS system is referred to as a ____.
omni
Channel
Extended Service Set
Time
26. In Infrastructure mode a single access point (AP) together with all associated stations (STAs) is called a ____.
2:1
BSS
Access
Passive
27. An ____ is a set of one or more interconnected BSSs and integrated local area networks (LANs) that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs.
hidden
Extended Service Set
125
Beacon
28. Part of the roaming process involves Implementing Mobile IP - Active Scanning - and ____ Scanning.
hidden
LEAP
RF
Passive
29. ____ System Authentication is a secure method of client device authentication onto a WLAN.
1:10
Open
3
BSS
30. Data modulation methods in DSSS systems are BPSK and ____.
LEAP
QPSK
infrared
2:1
31. Dipole antennas are ____-directional antennas.
BSS
Passive
False
omni
32. Antenna diversity compensates for a wireless LAN problem called ____.
1:10
Passive
Multipath
hidden
33. A parabolic ____ is one type of a highly directional antenna.
RF
Access
dish
60
34. A loss of -10dB yields a power ratio of ____.
22
Time
QPSK
1:10
35. The ____ node problem can be caused by interfering obstacles between clients.
hidden
60
Passive
2:1
36. DSSS uses channels that are ___ MHz wide to transmit data in the 2.4 GHz ISM band.
22
2:1
AP
dish
37. MAC filters can be implemented on a WLAN on an ____ point or on a RADIUS server.
LEAP
dB
Access
60
38. ____ is the data modulation method used in FHSS.
60
GFSK
LEAP
1:10
39. WLAN client-side devices use the security features EAP and ____.
Shared
LEAP
Diffraction
i
40. On August 31 - 2000 - the FCC mandated that FHSS systems using fewer than 75 hops must have a maximum power output of ___ mW.
Shared
Time
125
Passive