Test your basic knowledge |

Wireless Certification

Instructions:
  • Answer 40 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ____ is the data modulation method used in FHSS.






2. In Infrastructure mode a single access point (AP) together with all associated stations (STAs) is called a ____.






3. To achieve 54 Mbps - 802.11a uses which type of data modulation?






4. All access points transmit a ____ management frame at a fixed interval.






5. Dipole antennas are ____-directional antennas.






6. Data modulation methods in DSSS systems are BPSK and ____.






7. An ____ is a set of one or more interconnected BSSs and integrated local area networks (LANs) that appear as a single BSS to the logical link control layer at any station associated with one of those BSSs.






8. Part of the roaming process involves Implementing Mobile IP - Active Scanning - and ____ Scanning.






9. A sequence of hops in a FHSS system is referred to as a ____.






10. Bluetooth uses a type of data modulation called ____.






11. The range of RF transmissions increases with greater transmitting ____ - not frequency.






12. A change in the direction and intensity of a group of waves after passing by an obstacle or the bending of waves around an object is referred to as ____.






13. On August 31 - 2000 - the FCC mandated that FHSS systems using fewer than 75 hops must have a maximum power output of ___ mW.






14. MAC filters can be implemented on a WLAN on an ____ point or on a RADIUS server.






15. T/F FHSS is inherently more secure than DSSS.






16. A loss of -10dB yields a power ratio of ____.






17. Insertion loss on WLAN splitters are measured in what units?






18. The ____ node problem can be caused by interfering obstacles between clients.






19. The FCC deals with RF Output power limits - appropriate RF Frequency band use - and ____ of frequency bands.






20. Beacon frames are used for ____ synchronization and passing channel selection information.






21. The FHSS hopset can be determined by listening to traffic on each of the hopping ____.






22. DSSS uses channels that are ___ MHz wide to transmit data in the 2.4 GHz ISM band.






23. DSSS systems support a maximum of __ APs in a co-located environment.






24. The units for relative power are dB and dB_.






25. Yagi and Patch antennas are examples of ____-directional antennas.






26. The Fresnel Zone must be at least __% cleared of obstructions.






27. With 802.11 it is possible to create an ad-hoc network of client devices without a controlling Access Point called an ____ - in which case the SSID is chosen by the client device that starts the network - and broadcasting of the SSID is performed in






28. The two types of WLAN scanning are active scanning and ____ scanning.






29. A parabolic ____ is one type of a highly directional antenna.






30. The two RF spread spectrum technologies in the IEEE 802.11 standard is FHSS and ____.






31. Body of water - flat stretch of earth - and metal roofs are considered to be smooth surfaces that can cause ____path.






32. Before going to sleep - a wireless station must notify the ____ of its intention to sleep.






33. The weather and future ____ should be considered when erecting a 2.4GHz WLAN outside antenna.






34. The spread spectrum FHSS exhibits resistance to narrowband __ interference by design.






35. Antenna diversity compensates for a wireless LAN problem called ____.






36. WLAN client-side devices use the security features EAP and ____.






37. The 802.11 standard contains 2.4 GHz FHSS - 2.4 GHz DSSS - and ____.






38. A gain of +3dB yieds a power ratio of __.






39. ____ System Authentication is a secure method of client device authentication onto a WLAN.






40. WEP keys are also known as ____ Secrets.