Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Maximum length of data (Frame body) is 2304 when ____ is not in use






2. Which if the following organizations is responsible for standards compliance?






3. What is regarded in 802.11e?






4. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






5. Wireless gateways come in two primary forms...






6. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






7. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






8. High Throughput mode 0






9. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






10. Three types of passive WEP attacks






11. The security amendment to the IEEE 802.11 standard requires ____






12. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






13. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






14. In this mode - the card acts as a normal access point






15. The association process happens after which phase?






16. When an RF signal bounces off a smooth non absorptive surface - the behavior is






17. A brute force attack is limited to breaking___ WEP keys






18. The radio card can operate in one of up to six possible modes of operation...






19. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






20. What is the gain of an antenna measured in






21. ____ is also known as the Protected management frame standard






22. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






23. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






24. The ___ acts as a hub for the WLAN; wireless frame pass through this device






25. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






26. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






27. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






28. Probe requests are used by clients as part of the ____ process






29. What best describes the Wi-Fi alliance?






30. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






31. What two devices use RF to communicate






32. A basic service set identifier (BSSID) is the MAC address of the ____






33. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






34. The process in which a wireless LAN clients connection moves from one access point to another is called ______






35. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






36. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






37. The length of a WEP key is typically ___ or ___






38. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






39. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






40. High throughput mode 3






41. The 802.11i amendment to the standard addresses which of the following technologies?






42. This is the default mode that sets the card as a client that could then connect to an AP






43. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






44. A ______________ does not always use an omnidirectional antenna






45. What kind of Algorithm does WPA2 use?






46. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






47. What algorithm does WEP use






48. The Access point can operate in a variety of modes...






49. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






50. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests