SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two characteristics of signals are
Roaming
ISM
Repeater
Amplitude and phase
2. An independent basic service set (IBSS) consists of how many access points?
Plaintext
Personal mode and Enterprise Mode
Arp
0
3. A basic service set (BSS) consists of how many access points
40 bit
22MHz wide
RC4
1
4. High Throughput mode 0
Greenfield mode
Data rate increases
Diffraction
Plaintext
5. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Workgroup Bridge mode.
LTE
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Personal mode and Enterprise Mode
6. The association process happens after which phase?
Degradation
Dual radio APs
Authentication
Master
7. 802.11 frames have a maximum 'upper-layer' payload of...
Arp replay
PIN
2304 bytes
Carefully plan a strategy using WEP and VLANs
8. High Throughput mode 1
802.11n
Dual radio APs
HT Non member protection mode
RC4
9. What is regarded in 802.11e?
1
Addresses wireless Quality of Service
Monitor
BSSID (Basic Service Set identifier)
10. Which function does RBAC provide?
Restricts access to authorized users
Semi directional and Highly directional
PIN
Single radio AP's
11. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
Interoperability testing organization
Spoof an address
Mesh network
12. In repeater mode - the repeater device connects to a normal '___ mode'
6 -12 - and 24 Mbps
Data rate increases
Root mode
802.11w
13. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
Enter a username and password that will be central administered
Two
A VPN to the office network
14. In this mode - the card acts as a normal access point
Master
40 bit
Deauth
11
15. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Fake auth
AES = CCMP required
6 -12 - and 24 Mbps
802.11
16. Aireplay-ng -0
Repeater
Deauth
Small Office/Home Office Organizations (SOHO)
RC4
17. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Active scanning
PIN
WEP
Authenticate - associate
18. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Root mode
Semi directional and Highly directional
Antenna diversity
Wavelength
19. 3 types of frames
802.11a
802.11r
Other 802.11a devices
Management - control - data
20. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
3
Independent
Bridge mode
BSSID (Basic Service Set identifier)
21. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Transmitter and receiver
Ad-Hoc
Trojan/Rogue APs
3
22. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Managed
Bridge mode
Other 802.11a devices
23. This is typically the 48-bit MAC address of the access point's radio card.
802.11r
BSSID (Basic Service Set identifier)
ARP spoofing
Automatically monitor the network for attacks
24. High throughput mode 2
Open system and Shared key
Bridge mode
HT 20 MHz protection mode
Residential and Enterprise
25. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Extended Service Set (ESS)
SSID and Channel
Fake auth
1 - 5.5 and 11 Mbps
26. the amplitude of an RF signal is
Height of an RF signal
802.11b HR/DSSS and 802.11 DSSS
SSID (service set identifier)
2304 bytes
27. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
FHSS
Mesh network
Service sets
Acknowledgement frames
28. This sets the card to participate in an independent basic service set
802.11b HR/DSSS and 802.11 DSSS
Ad-Hoc
Managed
Active mode
29. In order to set up an ad hoc network a user must know which two parameters?
Number of users and software applications in use
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
AP radio
SSID and Channel
30. Bridge mode will not allow client associations and is ______ only
Interference from a neighboring access point RF denial-of-service (Dos) attack
AP to AP
DBi
Height of an RF signal
31. WI-Fi Protected Setup was designed for which of the following wireless applications?
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Addresses wireless Quality of Service
HT 20 MHz protection mode
Small Office/Home Office Organizations (SOHO)
32. A station can act as a routing node in a wireless mesh network
Passve Scanning
Carefully plan a strategy using WEP and VLANs
Mesh
Deauth
33. ___ are used to describe the basic components and topology of a WLAN
UNII
Arp replay
Service sets
Client
34. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Other 802.11a devices
802.11n
40 bit
BSSID (Basic Service Set identifier)
35. Point to Point links typically use which antenna types?
Unencrypted
Indoor and outdoor
Semi directional and Highly directional
14
36. an 802.11b 2.4GHz channel is how wide in MHz?
Enter a username and password that will be central administered
Ad-Hoc
22MHz wide
Wi-Fi Alliance
37. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
WPA2
Active scanning
Security
Authenticate - associate
38. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11b HR/DSSS and 802.11 DSSS
Managed
ERP protection
802.11i
39. This type of authentication is essentially 'Null authentication'
Open system
WPA2
3
Plaintext
40. Which security methods do 802.11g access points support?
Unicast
Independent
UNII
WPA Enterprise -WEP -MAC filters
41. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
Brute force - statistical and dictionary
CTS attacks - Deauth attack - Association flood - Jamming
802.11g
42. These are user configurable and present in only five 802.11 frame types...
WPA Enterprise -WEP -MAC filters
Beacons - Probe request - Probe response - Association Request - Reassociation Request
RC4
Two
43. Layer 2 Tunneling Protocol commonly uses which encryption method?
Greenfield mode
IPSec
AP radio
1 - 5.5 and 11 Mbps
44. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
LTE
Encryption
Addresses wireless Quality of Service
Degradation
45. 802.11a uses which spread spectrum technology?
OFDM
Restricts access to authorized users
Semi directional and Highly directional
Repeater
46. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Small Office/Home Office Organizations (SOHO)
ISM
802.11a
Carefully plan a strategy using WEP and VLANs
47. Typically a point-to-multipoint link consists of ____ connections
6 -12 - and 24 Mbps
Three
Master
Small Office/Home Office Organizations (SOHO)
48. 802.11w can only be used in networks using_____
WPA/WPA2
Wavelength
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
1 - 5.5 and 11 Mbps
49. A weakness with MAC filtering is that it allows an intruder to ____
Quality of Service
Spoof an address
Dynamic Rate switching
Point-to-point link
50. The Layer 2 frame will be...
Unencrypted
Bridge mode
2.4-2.5GHz
Arp