Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which security methods do 802.11g access points support?






2. In this mode - the card acts as a normal access point






3. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


4. 3 types of frames






5. The 802.11i amendment to the standard addresses which of the following technologies?






6. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






7. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






8. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






9. The ___ acts as a hub for the WLAN; wireless frame pass through this device






10. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






11. 3 types of antennas






12. Management frames are sent in....






13. Bluetooth uses a radio technology called






14. Maximum length of data (Frame body) is 2304 when ____ is not in use






15. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






16. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






17. An Ack is expected for every____ frame transmitted






18. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






19. Aireplay-ng -0






20. 802.11b is capable of which data rates?






21. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






22. This is a topology in which two or more APs are connected by a common distribution system.






23. Layer 2 Tunneling Protocol commonly uses which encryption method?






24. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






25. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






26. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






27. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi






28. What best describes the Wi-Fi alliance?






29. High Throughput mode 0






30. These are user configurable and present in only five 802.11 frame types...






31. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






32. When an RF signal bounces off a smooth non absorptive surface - the behavior is






33. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...






34. Wireless gateways come in two primary forms...






35. This sets the card to participate in an independent basic service set






36. A station can act as a routing node in a wireless mesh network






37. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






38. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






39. The Layer 2 frame will be...






40. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






41. A ______________ does not always use an omnidirectional antenna






42. The radio card can operate in one of up to six possible modes of operation...






43. A brute force attack is limited to breaking___ WEP keys






44. Which if the following organizations is responsible for standards compliance?






45. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






46. Name two absolute measures of RF power






47. The length of a WEP key is typically ___ or ___






48. This is typically the 48-bit MAC address of the access point's radio card.






49. When a wireless LAN device listens for beacon frames - it is participating in which phase?






50. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?