SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Point to Point links typically use which antenna types?
802.11
Wavelength
Semi directional and Highly directional
Passve Scanning
2. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Unencrypted
22MHz wide
Authenticate - associate
ARP spoofing
3. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Refraction
WPA 2.0 personal and WPS
Mesh network
Access point
4. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
32 character maximum and is case sensitive
Personal mode and Enterprise Mode
1 - 5.5 and 11 Mbps
Access point
5. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
Two
Carefully plan a strategy using WEP and VLANs
Enter a username and password that will be central administered
6. The 802.11i amendment to the standard addresses which of the following technologies?
Security
Captive portal
Mesh network
IPSec
7. The security amendment to the IEEE 802.11 standard requires ____
Plaintext
CCMP
Two
Active mode
8. A pre-shared key mode may be vulnerable to a ____ attack
One or more
Dictionary
SOHO brands that support WPS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
9. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
IPSec
Active mode
802.11b
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
10. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Number of users and software applications in use
Access point
CA - Collision avoidance
11. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Obstacles
A VPN to the office network
ERP protection
Unicast
12. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Data rate increases
FCC
ISM
13. In order to set up an ad hoc network a user must know which two parameters?
Basic Service Set (BSS)
SSID and Channel
CTS attacks - Deauth attack - Association flood - Jamming
Wavelength
14. According to the 802.11a amendment - which data rates are mandatory?
Arp replay
Amplitude and phase
6 -12 - and 24 Mbps
Trojan/Rogue APs - Arp spoofing - DNS spoofing
15. 802.11g LAN operates in what frequency range?
CTS attacks - Deauth attack - Association flood - Jamming
64-bit - 128-bit
Beacons - Probe request - Probe response - Association Request - Reassociation Request
2.4-2.5GHz
16. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Point-to-point link
Arp replay
WPA 2.0 personal and WPS
Refraction
17. When RF passes or bends around an obstacle such as a building or column - the behavior is
Open system
Diffraction
Ad-Hoc
Residential and Enterprise
18. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
7
Station (STA)
40 bit
802.11r
19. An independent basic service set (IBSS) consists of how many access points?
Encryption
Automatically monitor the network for attacks
0
Three
20. The length of a WEP key is typically ___ or ___
OFDM
64-bit - 128-bit
0
Workgroup Bridge mode.
21. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
One or more
SOHO brands that support WPS
Authenticate - associate
3
22. High throughput mode 2
Secure Layer 3 transmissions over a public network infrastructure
WPA Enterprise -WEP -MAC filters
2304 bytes
HT 20 MHz protection mode
23. Two characteristics of signals are
Management
Amplitude and phase
ERP protection
Fake auth
24. Which if the following organizations is responsible for standards compliance?
HT Non member protection mode
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Three
Wi-Fi Alliance
25. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Fakeauth
SSID (service set identifier)
26. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
BSSID (Basic Service Set identifier)
FCC
Acknowledgement frames
27. the amplitude of an RF signal is
Height of an RF signal
Dual radio APs
ARP spoofing
Degradation
28. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
Addresses wireless Quality of Service
Captive portal
SSID (service set identifier)
29. The Access point can operate in a variety of modes...
11
1
Two
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
30. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Carefully plan a strategy using WEP and VLANs
WPA/WPA2
Captive portal
Workgroup Bridge mode.
31. Wireless gateways come in two primary forms...
Residential and Enterprise
Enter a username and password that will be central administered
WPA/WPA2
BSSID (Basic Service Set identifier)
32. As a device moves away from an access point - what is true regarding dynamic rate switching?
1
3
Degradation
Data rate increases
33. A service set identifier (SSID) has a maximum limit of how many characters?
IPSec
Other 802.11a devices
Watt and mW
32
34. A brute force attack is limited to breaking___ WEP keys
1 - 5.5 and 11 Mbps
40 bit
Residential and Enterprise
CTS attacks - Deauth attack - Association flood - Jamming
35. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
36. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Extended Service Set (ESS)
Monitor
802.11
2.4-2.5GHz
37. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Interoperability testing organization
802.11a
3
LTE
38. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
Authenticate - associate
802.11b HR/DSSS and 802.11 DSSS
Access point
39. This is the default mode that sets the card as a client that could then connect to an AP
Fake auth
Passphrase
1 - 5.5 and 11 Mbps
Managed
40. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
PIN
WPA2
Wireless gateways
3
41. Probe requests are used by clients as part of the ____ process
Unencrypted
Active scanning
Number of users and software applications in use
Open system and Shared key
42. A basic service set (BSS) consists of how many access points
1
Client
Reflection
Refraction
43. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
Automatically monitor the network for attacks
Antenna diversity
2304 bytes
44. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
IPSec
Other 802.11a devices
4 channels
45. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
25 MHz
Wireless Game adapters and Media Bridges
Trojan/Rogue APs
Brute force - statistical and dictionary
46. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
802.11n
Monitor
Independent
Know the SSID and enter it manually
47. Bridge mode will not allow client associations and is ______ only
TKIP - optional RC4
Dual radio APs
AP to AP
Two
48. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Basic Service Set (BSS)
Quality of Service
Access point
Dictionary
49. The capacity of an access point is dependent upon which factors?
Managed
Basic Service Set (BSS)
Unicast
Number of users and software applications in use
50. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Passve Scanning
Wireless Game adapters and Media Bridges
Roaming
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees