Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






2. A newly configured wireless intrusion prevention system will___






3. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






4. WiMAX 802.16 authentication is based on...






5. When an RF signal bounces off a smooth non absorptive surface - the behavior is






6. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






7. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






8. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


9. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






10. High throughput mode 3






11. Which function does RBAC provide?






12. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






13. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






14. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






15. 802.11 uses CSMA/...






16. Which if the following organizations is responsible for standards compliance?






17. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






18. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






19. What kind of Algorithm does WPA2 use?






20. The process in which a wireless LAN clients connection moves from one access point to another is called ______






21. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...






22. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






23. The ___ acts as a hub for the WLAN; wireless frame pass through this device






24. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






25. Collisions are detected through the use of....






26. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






27. This is a topology in which two or more APs are connected by a common distribution system.






28. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






29. Bluetooth uses a radio technology called






30. What item has an effect on RF line of site?






31. Give two examples of WGB devices.






32. High throughput mode 2






33. When RF passes or bends around an obstacle such as a building or column - the behavior is






34. 802.11g LAN operates in what frequency range?






35. When a wireless LAN device listens for beacon frames - it is participating in which phase?






36. An independent basic service set (IBSS) consists of how many access points?






37. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






38. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






39. Typically a point-to-multipoint link consists of ____ connections






40. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






41. A weakness with MAC filtering is that it allows an intruder to ____






42. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






43. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






44. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi






45. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






46. The Layer 2 frame will be...






47. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






48. Maximum length of data (Frame body) is 2304 when ____ is not in use






49. Layer 2 Tunneling Protocol commonly uses which encryption method?






50. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS