SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Name 3 channels considered non overlapping in the 2.4GHZ band
WEP
32 character maximum and is case sensitive
1 -6 -11
Dual radio APs
2. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
802.11a
X.509 certificates on the subscriber side only.
Mismatched SSID
3. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Captive portal
Wireless gateways
Single radio AP's
IPSec
4. In this mode - the card acts as a normal access point
ARP spoofing
Master
Mesh
32
5. Probe requests are used by clients as part of the ____ process
Passive scan
Dictionary
Active scanning
Automatically monitor the network for attacks
6. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
802.11g
Workgroup Bridge mode.
0
1
7. Typically a point-to-multipoint link consists of ____ connections
Three
Obstacles
Service sets
Trojan/Rogue APs - Arp spoofing - DNS spoofing
8. When RF passes or bends around an obstacle such as a building or column - the behavior is
4 channels
Addresses wireless Quality of Service
Workgroup Bridge mode.
Diffraction
9. Three types of passive WEP attacks
25 MHz
AES = CCMP required
Open system and Shared key
Brute force - statistical and dictionary
10. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Basic Service Set (BSS)
LTE
Amplitude and phase
Reflection
11. What best describes the Wi-Fi alliance?
SSID (service set identifier)
Repeater
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Interoperability testing organization
12. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Unicast
Authenticate - associate
Carefully plan a strategy using WEP and VLANs
802.11b HR/DSSS and 802.11 DSSS
13. Name two absolute measures of RF power
Fake auth
Watt and mW
Roaming
7
14. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Degradation
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Antenna diversity
Dictionary
15. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Passve Scanning
MAC
802.11
25 MHz
16. What type of algorithm does WPA use
Managed
ERP-OFDM - DSSS
TKIP - optional RC4
Deauth
17. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
A VPN to the office network
UNII
ARP spoofing
18. The 802.11g standard uses which two speed spectrum technologies.
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Carefully plan a strategy using WEP and VLANs
ERP-OFDM - DSSS
WPA 2.0 personal and WPS
19. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Dynamic Rate switching
Fake auth
Repeater
Management
20. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
WPA2
RC4
Station (STA)
Authentication
21. WPA was developed as an interim solution for which amendment to the 802.11 standards?
WEP
802.11i
One or more
Enter a username and password that will be central administered
22. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
SSID (service set identifier)
Monitor
1 -6 -11
23. A ______________ does not always use an omnidirectional antenna
Roaming
Number of users and software applications in use
Point-to-point link
3
24. WI-Fi Protected Setup was designed for which of the following wireless applications?
Deauth
Client
WPA2 -WEP
Small Office/Home Office Organizations (SOHO)
25. Which security feature provides the strongest security for a home-based wireless network?
1 - 5.5 and 11 Mbps
Independent
Passphrase
SSID (service set identifier)
26. an 802.11b 2.4GHz channel is how wide in MHz?
802.11b HR/DSSS and 802.11 DSSS
RTS/CTS
FCC
22MHz wide
27. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
CCMP
802.11r
64-bit - 128-bit
LTE
28. A station can act as a routing node in a wireless mesh network
WEP
Access point
HT 20 MHz protection mode
Mesh
29. The 802.11i amendment to the standard addresses which of the following technologies?
Quality of Service
Security
Arp
Wireless gateways
30. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Unencrypted
Monitor
31. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Mesh network
Passive scan
Access point
RC4
32. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
SSID (service set identifier)
Amplitude and phase
Monitor
33. Collisions are detected through the use of....
802.11b HR/DSSS and 802.11 DSSS
Acknowledgement frames
Basic Service Set (BSS)
Wireless gateways
34. WiMAX 802.16 authentication is based on...
11
X.509 certificates on the subscriber side only.
Extended Service Set (ESS)
Authentication
35. What two devices use RF to communicate
Dictionary
Transmitter and receiver
WPA2
Know the SSID and enter it manually
36. A weakness with MAC filtering is that it allows an intruder to ____
Amplitude and phase
Personal mode and Enterprise Mode
Spoof an address
RTS/CTS
37. The open system authentication process uses how many frames?
Single radio AP's
Two
Arp
6 -12 - and 24 Mbps
38. This is the default mode that sets the card as a client that could then connect to an AP
Semi directional and Highly directional
Service sets
Managed
Passve Scanning
39. This type of authentication is essentially 'Null authentication'
Open system
Active scanning
3
Managed
40. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
ISM
2.4-2.5GHz
WPA 2.0 personal and WPS
Number of users and software applications in use
41. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
802.11i
Spoof an address
Fakeauth
42. 802.11g LAN operates in what frequency range?
Quality of Service
MAC
2.4-2.5GHz
Reflection
43. A basic service set identifier (BSSID) is the MAC address of the ____
ERP-OFDM - DSSS
AP radio
Dynamic Rate switching
Mesh
44. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Fake auth
Unencrypted
Degradation
Transmitter and receiver
45. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Wi-Fi Alliance
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Interference from a neighboring access point RF denial-of-service (Dos) attack
Amplitude and phase
46. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Three
Active mode
Passive scan
Fake auth
47. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
Passive scan
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Service sets
48. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Encryption
CTS attacks - Deauth attack - Association flood - Jamming
11
49. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Obstacles
Dual radio APs
Repeater
Dynamic Rate switching
50. What is regarded in 802.11e?
4 channels
Encryption
DB and dBi
Addresses wireless Quality of Service