SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Certification
Start Test
Study First
Subjects
:
it-skills
,
certifications
Instructions:
Answer 40 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Data modulation methods in DSSS systems are BPSK and ____.
QPSK
Multipath
False
Diffraction
2. WEP keys are also known as ____ Secrets.
1:10
Passive
Shared
QPSK
3. The Fresnel Zone must be at least __% cleared of obstructions.
Multipath
DSSS
125
60
4. The two RF spread spectrum technologies in the IEEE 802.11 standard is FHSS and ____.
GFSK
DSSS
semi
AP
5. Body of water - flat stretch of earth - and metal roofs are considered to be smooth surfaces that can cause ____path.
Multipath
60
Passive
3
6. The 802.11 standard contains 2.4 GHz FHSS - 2.4 GHz DSSS - and ____.
infrared
Multipath
Channel
GFSK
7. Bluetooth uses a type of data modulation called ____.
infrared
64QAM
obstructions
GFSK
8. On August 31 - 2000 - the FCC mandated that FHSS systems using fewer than 75 hops must have a maximum power output of ___ mW.
125
Extended Service Set
IBSS (Independent Basic Service Set)
QPSK
9. A sequence of hops in a FHSS system is referred to as a ____.
DSSS
Channel
power
3
10. A gain of +3dB yieds a power ratio of __.
64QAM
BSS
2:1
Passive
11. The two types of WLAN scanning are active scanning and ____ scanning.
Time
Multipath
Passive
Diffraction
12. T/F FHSS is inherently more secure than DSSS.
64QAM
AP
False
22
13. ____ is the data modulation method used in FHSS.
LEAP
125
GFSK
hidden
14. The range of RF transmissions increases with greater transmitting ____ - not frequency.
22
Multipath
IBSS (Independent Basic Service Set)
power
15. Dipole antennas are ____-directional antennas.
Time
Channels
omni
BSS
16. Part of the roaming process involves Implementing Mobile IP - Active Scanning - and ____ Scanning.
IBSS (Independent Basic Service Set)
Passive
Shared
1:10
17. Beacon frames are used for ____ synchronization and passing channel selection information.
LEAP
Time
obstructions
Beacon
18. To achieve 54 Mbps - 802.11a uses which type of data modulation?
64QAM
Diffraction
1:10
RF
19. A change in the direction and intensity of a group of waves after passing by an obstacle or the bending of waves around an object is referred to as ____.
22
3
Diffraction
IBSS (Independent Basic Service Set)
20. Before going to sleep - a wireless station must notify the ____ of its intention to sleep.
3
AP
64QAM
False
21. DSSS systems support a maximum of __ APs in a co-located environment.
Passive
Multipath
125
3
22. With 802.11 it is possible to create an ad-hoc network of client devices without a controlling Access Point called an ____ - in which case the SSID is chosen by the client device that starts the network - and broadcasting of the SSID is performed in
LEAP
i
dish
IBSS (Independent Basic Service Set)
23. An ____ is a set of one or more interconnected BSSs and integrated local area networks (LANs) that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs.
Time
infrared
3
Extended Service Set
24. Insertion loss on WLAN splitters are measured in what units?
hidden
dB
Passive
Beacon
25. The ____ node problem can be caused by interfering obstacles between clients.
Extended Service Set
obstructions
False
hidden
26. Antenna diversity compensates for a wireless LAN problem called ____.
dB
DSSS
Multipath
IBSS (Independent Basic Service Set)
27. A loss of -10dB yields a power ratio of ____.
1:10
Beacon
64QAM
Passive
28. WLAN client-side devices use the security features EAP and ____.
LEAP
infrared
i
22
29. ____ System Authentication is a secure method of client device authentication onto a WLAN.
GFSK
RF
dB
Open
30. MAC filters can be implemented on a WLAN on an ____ point or on a RADIUS server.
BSS
Channels
Multipath
Access
31. The FHSS hopset can be determined by listening to traffic on each of the hopping ____.
1:10
Channels
QPSK
RF
32. Yagi and Patch antennas are examples of ____-directional antennas.
semi
infrared
AP
GFSK
33. DSSS uses channels that are ___ MHz wide to transmit data in the 2.4 GHz ISM band.
3
64QAM
RF
22
34. All access points transmit a ____ management frame at a fixed interval.
Passive
obstructions
1:10
Beacon
35. The FCC deals with RF Output power limits - appropriate RF Frequency band use - and ____ of frequency bands.
licensing
dish
2:1
obstructions
36. The spread spectrum FHSS exhibits resistance to narrowband __ interference by design.
Multipath
i
RF
Access
37. In Infrastructure mode a single access point (AP) together with all associated stations (STAs) is called a ____.
dish
Multipath
RF
BSS
38. A parabolic ____ is one type of a highly directional antenna.
QPSK
AP
RF
dish
39. The weather and future ____ should be considered when erecting a 2.4GHz WLAN outside antenna.
22
Diffraction
obstructions
infrared
40. The units for relative power are dB and dB_.
licensing
1:10
power
i