Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






2. This is typically the 48-bit MAC address of the access point's radio card.






3. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






4. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






5. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


6. Typically a point-to-multipoint link consists of ____ connections






7. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






8. In bluetooth - one master may communicate with up to ___ slaves in a piconet






9. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






10. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






11. 802.11w can only be used in networks using_____






12. This is the default mode that sets the card as a client that could then connect to an AP






13. In repeater mode - the repeater device connects to a normal '___ mode'






14. an 802.11b 2.4GHz channel is how wide in MHz?






15. A station can act as a routing node in a wireless mesh network






16. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






17. Which security feature provides the strongest security for a home-based wireless network?






18. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






19. Probe requests are used by clients as part of the ____ process






20. A basic service set (BSS) consists of how many access points






21. What kind of Algorithm does WPA2 use?






22. 3 types of antennas






23. The process in which a wireless LAN clients connection moves from one access point to another is called ______






24. 802.11g LAN operates in what frequency range?






25. 802.11b is capable of which data rates?






26. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






27. What two devices use RF to communicate






28. A newly configured wireless intrusion prevention system will___






29. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






30. Which process is a VPN solution intended to provide for users connection to a network






31. What type of certification came from 802.11i






32. High Throughput mode 1






33. WiMAX 802.16 authentication is based on...






34. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






35. A pre-shared key mode may be vulnerable to a ____ attack






36. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






37. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






38. ___ are used to describe the basic components and topology of a WLAN






39. These are user configurable and present in only five 802.11 frame types...






40. High throughput mode 2






41. Two characteristics of signals are






42. What type of wireless network device is PIN-based security most commonly used with






43. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






44. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






45. Layer 2 Tunneling Protocol commonly uses which encryption method?






46. Three types of MITM attacks






47. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






48. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






49. This type of authentication is essentially 'Null authentication'






50. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?