Test your basic knowledge |

Wireless Certification

Instructions:
  • Answer 40 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. To achieve 54 Mbps - 802.11a uses which type of data modulation?






2. Before going to sleep - a wireless station must notify the ____ of its intention to sleep.






3. A loss of -10dB yields a power ratio of ____.






4. ____ is the data modulation method used in FHSS.






5. The units for relative power are dB and dB_.






6. Body of water - flat stretch of earth - and metal roofs are considered to be smooth surfaces that can cause ____path.






7. Dipole antennas are ____-directional antennas.






8. The range of RF transmissions increases with greater transmitting ____ - not frequency.






9. The FHSS hopset can be determined by listening to traffic on each of the hopping ____.






10. Antenna diversity compensates for a wireless LAN problem called ____.






11. DSSS uses channels that are ___ MHz wide to transmit data in the 2.4 GHz ISM band.






12. A parabolic ____ is one type of a highly directional antenna.






13. An ____ is a set of one or more interconnected BSSs and integrated local area networks (LANs) that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs.






14. The two RF spread spectrum technologies in the IEEE 802.11 standard is FHSS and ____.






15. The FCC deals with RF Output power limits - appropriate RF Frequency band use - and ____ of frequency bands.






16. Insertion loss on WLAN splitters are measured in what units?






17. The ____ node problem can be caused by interfering obstacles between clients.






18. The weather and future ____ should be considered when erecting a 2.4GHz WLAN outside antenna.






19. Part of the roaming process involves Implementing Mobile IP - Active Scanning - and ____ Scanning.






20. Data modulation methods in DSSS systems are BPSK and ____.






21. The spread spectrum FHSS exhibits resistance to narrowband __ interference by design.






22. The 802.11 standard contains 2.4 GHz FHSS - 2.4 GHz DSSS - and ____.






23. Beacon frames are used for ____ synchronization and passing channel selection information.






24. A change in the direction and intensity of a group of waves after passing by an obstacle or the bending of waves around an object is referred to as ____.






25. On August 31 - 2000 - the FCC mandated that FHSS systems using fewer than 75 hops must have a maximum power output of ___ mW.






26. DSSS systems support a maximum of __ APs in a co-located environment.






27. MAC filters can be implemented on a WLAN on an ____ point or on a RADIUS server.






28. The Fresnel Zone must be at least __% cleared of obstructions.






29. Yagi and Patch antennas are examples of ____-directional antennas.






30. All access points transmit a ____ management frame at a fixed interval.






31. Bluetooth uses a type of data modulation called ____.






32. The two types of WLAN scanning are active scanning and ____ scanning.






33. A gain of +3dB yieds a power ratio of __.






34. WLAN client-side devices use the security features EAP and ____.






35. With 802.11 it is possible to create an ad-hoc network of client devices without a controlling Access Point called an ____ - in which case the SSID is chosen by the client device that starts the network - and broadcasting of the SSID is performed in






36. In Infrastructure mode a single access point (AP) together with all associated stations (STAs) is called a ____.






37. ____ System Authentication is a secure method of client device authentication onto a WLAN.






38. T/F FHSS is inherently more secure than DSSS.






39. WEP keys are also known as ____ Secrets.






40. A sequence of hops in a FHSS system is referred to as a ____.