SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bridge mode will not allow client associations and is ______ only
AP to AP
WPA/WPA2
Other 802.11a devices
1 -6 -11
2. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Frequency
Access point
Workgroup Bridge mode.
Wireless gateways
3. Collisions are detected through the use of....
802.11r
Acknowledgement frames
Greenfield mode
Encryption
4. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
0
Wireless gateways
Indoor and outdoor
4 channels
5. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Security
802.11r
Management
Mesh network
6. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
802.11b HR/DSSS and 802.11 DSSS
WPA/WPA2
Active scanning
7. What kind of Algorithm does WPA2 use?
Automatically monitor the network for attacks
Acknowledgement frames
22MHz wide
AES = CCMP required
8. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Diffraction
7
IPSec
A VPN to the office network
9. A brute force attack is limited to breaking___ WEP keys
Mesh
ERP protection
DBi
40 bit
10. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Automatically monitor the network for attacks
Active scanning
802.11
Fake auth
11. In repeater mode - the repeater device connects to a normal '___ mode'
Passphrase
32
Root mode
Point-to-point link
12. Aireplay-ng -3
Spoof an address
Arp
2.4-2.5GHz
MAC
13. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Active mode
Independent
Reflection
Indoor and outdoor
14. The radio card can operate in one of up to six possible modes of operation...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Arp
Bridge mode
DBi
15. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
2.4-2.5GHz
ARP spoofing
2304 bytes
16. What best describes the Wi-Fi alliance?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Interoperability testing organization
Dual radio APs
Arp
17. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Dictionary
Access point
3
32
18. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
19. 802.11 uses CSMA/...
Fake auth
2.4-2.5GHz
CA - Collision avoidance
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
20. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Residential and Enterprise
Addresses wireless Quality of Service
Enter a username and password that will be central administered
21. A weakness with MAC filtering is that it allows an intruder to ____
14
Spoof an address
Trojan/Rogue APs
Acknowledgement frames
22. 802.11w can only be used in networks using_____
WPA2
WPA/WPA2
1
Other 802.11a devices
23. 802.11b is capable of which data rates?
1 - 5.5 and 11 Mbps
Mesh network
Reflection
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
24. Name two absolute measures of RF power
Mesh
802.11w
FHSS
Watt and mW
25. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
1 - 5.5 and 11 Mbps
IPSec
Wavelength
AP to AP
26. Two characteristics of signals are
DBi
Amplitude and phase
CTS attacks - Deauth attack - Association flood - Jamming
Extended Service Set (ESS)
27. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
802.11
802.11b
Personal mode and Enterprise Mode
Quality of Service
28. 3 types of frames
Personal mode and Enterprise Mode
Three
Management - control - data
Bridge mode
29. High throughput mode 2
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
OFDM
HT 20 MHz protection mode
Trojan/Rogue APs - Arp spoofing - DNS spoofing
30. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Quality of Service
Dual radio APs
Acknowledgement frames
ERP protection
31. This is the default mode that sets the card as a client that could then connect to an AP
Point-to-point link
ARP spoofing
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Managed
32. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
0
LTE
Management - control - data
Dictionary
33. Probe requests are used by clients as part of the ____ process
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Plaintext
Mismatched SSID
Active scanning
34. Give two examples of WGB devices.
Transmitter and receiver
TKIP - optional RC4
Wireless Game adapters and Media Bridges
Degradation
35. This sets the card to participate in an independent basic service set
Ad-Hoc
Small Office/Home Office Organizations (SOHO)
Passphrase
Interference from a neighboring access point RF denial-of-service (Dos) attack
36. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
SSID and Channel
BSSID (Basic Service Set identifier)
Quality of Service
Wi-Fi Alliance
37. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
Addresses wireless Quality of Service
Authentication
1 -6 -11
38. A pre-shared key mode may be vulnerable to a ____ attack
Plaintext
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Dictionary
802.11n
39. Both ___ and ___ are wireless LAN security methods that support shared key security.
Security
Spoof an address
WPA2 -WEP
802.11b
40. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
LTE
Active scanning
SSID and Channel
41. This is typically the 48-bit MAC address of the access point's radio card.
Open system
SOHO brands that support WPS
BSSID (Basic Service Set identifier)
Deauth
42. A ______________ does not always use an omnidirectional antenna
IPSec
Point-to-point link
Interoperability testing organization
6 -12 - and 24 Mbps
43. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
WPA2 -WEP
32
Arp replay
Walled Garden.
44. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Monitor
Three
Wi-Fi Alliance
45. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Wireless Game adapters and Media Bridges
Roaming
Management
Automatically monitor the network for attacks
46. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Unicast
HT Non member protection mode
Dynamic Rate switching
Authenticate - associate
47. A newly configured wireless intrusion prevention system will___
WPA2 -WEP
Wireless gateways
Automatically monitor the network for attacks
Interoperability testing organization
48. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
ISM
Wireless gateways
2.4-2.5GHz
Fake auth
49. What organization is responsible for unlicensed frequency band regulations in the United States?
Client
802.11b
FCC
Carefully plan a strategy using WEP and VLANs
50. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
Beacons - Probe request - Probe response - Association Request - Reassociation Request
CCMP
Wi-Fi Alliance