SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In order to set up an ad hoc network a user must know which two parameters?
One or more
SSID and Channel
Independent
A VPN to the office network
2. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Number of users and software applications in use
14
Monitor
3. What kind of Algorithm does WPA2 use?
Managed
Monitor
AES = CCMP required
Arp replay
4. In this mode - the card acts as a normal access point
Authentication
OFDM
CCMP
Master
5. 802.11 frames have a maximum 'upper-layer' payload of...
Brute force - statistical and dictionary
2304 bytes
Station (STA)
Acknowledgement frames
6. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Amplitude and phase
Fake auth
Authenticate - associate
WEP
7. Name two relative measures of power
32 character maximum and is case sensitive
PIN
802.11a
DB and dBi
8. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Interference from a neighboring access point RF denial-of-service (Dos) attack
Small Office/Home Office Organizations (SOHO)
Residential and Enterprise
802.11n
9. A weakness with MAC filtering is that it allows an intruder to ____
Dual radio APs
Spoof an address
Plaintext
HT 20 MHz protection mode
10. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
SOHO brands that support WPS
WPA/WPA2
Workgroup Bridge mode.
Interoperability testing organization
11. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
Wi-Fi Alliance
WPA2 -WEP
CTS attacks - Deauth attack - Association flood - Jamming
12. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
Independent
Residential and Enterprise
Walled Garden.
13. The process in which a wireless LAN clients connection moves from one access point to another is called ______
CTS attacks - Deauth attack - Association flood - Jamming
Roaming
Greenfield mode
Unicast
14. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Trojan/Rogue APs
Arp replay
Mismatched SSID
Root mode
15. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Degradation
X.509 certificates on the subscriber side only.
CA - Collision avoidance
16. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Wi-Fi Alliance
Independent
WEP
Number of users and software applications in use
17. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Carefully plan a strategy using WEP and VLANs
Authenticate - associate
DBi
Repeater
18. A ______________ does not always use an omnidirectional antenna
MAC
PIN
Bridge mode
Point-to-point link
19. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Roaming
Authenticate - associate
Basic Service Set (BSS)
Beacons - Probe request - Probe response - Association Request - Reassociation Request
20. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
40 bit
Arp replay
ISM
Height of an RF signal
21. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
Plaintext
Independent
Degradation
22. Aireplay-ng -1
Fakeauth
HT Non member protection mode
WPA Enterprise -WEP -MAC filters
Wi-Fi Alliance
23. What type of algorithm does WPA use
IPSec
TKIP - optional RC4
Station (STA)
Degradation
24. What is regarded in 802.11e?
Indoor and outdoor
Interference from a neighboring access point RF denial-of-service (Dos) attack
1
Addresses wireless Quality of Service
25. High Throughput mode 0
Greenfield mode
Monitor
Authenticate - associate
HT 20 MHz protection mode
26. This type of authentication is essentially 'Null authentication'
7
Open system
Passve Scanning
Know the SSID and enter it manually
27. Give two examples of WGB devices.
Wireless gateways
WPA2
Wireless Game adapters and Media Bridges
Basic Service Set (BSS)
28. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
32
Repeater
Access point
A VPN to the office network
29. The length of a WEP key is typically ___ or ___
6 -12 - and 24 Mbps
Quality of Service
A VPN to the office network
64-bit - 128-bit
30. The 802.11i amendment to the standard addresses which of the following technologies?
Captive portal
802.11
Security
AES = CCMP required
31. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Active scanning
Mesh
802.11w
32. A station can act as a routing node in a wireless mesh network
CTS attacks - Deauth attack - Association flood - Jamming
AES = CCMP required
Mesh
Carefully plan a strategy using WEP and VLANs
33. Typically a point-to-multipoint link consists of ____ connections
Three
802.11a
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Residential and Enterprise
34. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
Arp replay
One or more
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
35. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Point-to-point link
Monitor
Basic Service Set (BSS)
Restricts access to authorized users
36. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Fake auth
Roaming
PIN
Wi-Fi Alliance
37. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
HT 20 MHz protection mode
ARP spoofing
MAC
38. Which if the following organizations is responsible for standards compliance?
Active scanning
Passive scan
Roaming
Wi-Fi Alliance
39. 802.11a uses which spread spectrum technology?
FHSS
OFDM
Roaming
Root mode
40. The Access point can operate in a variety of modes...
Trojan/Rogue APs
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Number of users and software applications in use
Service sets
41. Three types of passive WEP attacks
Degradation
HT Non member protection mode
ERP-OFDM - DSSS
Brute force - statistical and dictionary
42. The radio card can operate in one of up to six possible modes of operation...
SSID and Channel
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Fake auth
Mismatched SSID
43. High Throughput mode 1
HT Non member protection mode
Quality of Service
802.11n
WPA2 -WEP
44. What type of certification came from 802.11i
Mesh network
802.11w
WPA2
Know the SSID and enter it manually
45. Point to Point links typically use which antenna types?
Mesh
Independent
7
Semi directional and Highly directional
46. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Independent
Basic Service Set (BSS)
Arp
Reflection
47. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
IPSec
Fake auth
25 MHz
DBi
48. The Layer 2 frame will be...
Unencrypted
Extended Service Set (ESS)
Mesh network
Service sets
49. What is the gain of an antenna measured in
Wireless Game adapters and Media Bridges
DBi
Encryption
Security
50. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Management - control - data
Access point
UNII
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests