SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -0
Deauth
UNII
Addresses wireless Quality of Service
Trojan/Rogue APs
2. 3 types of antennas
Roaming
SSID and Channel
Mismatched SSID
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
3. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Authenticate - associate
One or more
HT Non member protection mode
4. Which function does RBAC provide?
6 -12 - and 24 Mbps
0
Restricts access to authorized users
IPSec
5. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
ERP-OFDM - DSSS
LTE
802.11r
6. A ______________ does not always use an omnidirectional antenna
Walled Garden.
Point-to-point link
802.11n
802.11b
7. What is the gain of an antenna measured in
1
Basic Service Set (BSS)
DBi
Workgroup Bridge mode.
8. Name two relative measures of power
Plaintext
802.11
DB and dBi
Three
9. What type of wireless network device is PIN-based security most commonly used with
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
SOHO brands that support WPS
BSSID (Basic Service Set identifier)
32
10. Management frames are sent in....
Addresses wireless Quality of Service
Plaintext
One or more
Restricts access to authorized users
11. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
A VPN to the office network
Trojan/Rogue APs
Mismatched SSID
FHSS
12. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
802.11b HR/DSSS and 802.11 DSSS
FCC
BSSID (Basic Service Set identifier)
Personal mode and Enterprise Mode
13. A brute force attack is limited to breaking___ WEP keys
40 bit
32
X.509 certificates on the subscriber side only.
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
14. This type of authentication is essentially 'Null authentication'
IPSec
RC4
32 character maximum and is case sensitive
Open system
15. Wireless gateways come in two primary forms...
Residential and Enterprise
Personal mode and Enterprise Mode
DBi
Semi directional and Highly directional
16. Three types of passive WEP attacks
Brute force - statistical and dictionary
Roaming
Transmitter and receiver
Monitor
17. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Independent
Root mode
Three
18. A weakness with MAC filtering is that it allows an intruder to ____
OFDM
Spoof an address
DB and dBi
Single radio AP's
19. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
IPSec
AP to AP
CA - Collision avoidance
20. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
1 -6 -11
Acknowledgement frames
Dynamic Rate switching
Small Office/Home Office Organizations (SOHO)
21. The Layer 2 frame will be...
ERP protection
Basic Service Set (BSS)
Open system
Unencrypted
22. A service set identifier (SSID) has a maximum limit of how many characters?
32
Interference from a neighboring access point RF denial-of-service (Dos) attack
Basic Service Set (BSS)
Dynamic Rate switching
23. This is typically the 48-bit MAC address of the access point's radio card.
802.11i
1 - 5.5 and 11 Mbps
802.11a
BSSID (Basic Service Set identifier)
24. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
ERP-OFDM - DSSS
SSID (service set identifier)
Diffraction
Mesh network
25. High Throughput mode 0
Greenfield mode
Active mode
Mismatched SSID
DB and dBi
26. The association process happens after which phase?
Authentication
1 - 5.5 and 11 Mbps
Residential and Enterprise
Management - control - data
27. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
BSSID (Basic Service Set identifier)
Walled Garden.
11
Dynamic Rate switching
28. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Transmitter and receiver
Fake auth
Independent
29. Which items are unique to a service set identifier
32 character maximum and is case sensitive
Trojan/Rogue APs
Repeater
Deauth
30. Beacons allow client devices to ____ for available LANS
Degradation
Indoor and outdoor
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Passive scan
31. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Client
WPA2 -WEP
Independent
UNII
32. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Wavelength
RTS/CTS
Authenticate - associate
Data rate increases
33. High throughput mode 3
HT 20 MHz protection mode
HT fixed mode
40 bit
One or more
34. This is a topology in which two or more APs are connected by a common distribution system.
WPA2
PIN
Mismatched SSID
Extended Service Set (ESS)
35. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
32
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
802.11n
36. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
Captive portal
FHSS
Ad-Hoc
37. Aireplay-ng -3
Arp
Data rate increases
Authenticate - associate
HT fixed mode
38. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
Restricts access to authorized users
Repeater
RC4
39. 802.11a uses which spread spectrum technology?
Passive scan
OFDM
Active scanning
Independent
40. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Access point
Monitor
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Authenticate - associate
41. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Arp replay
Dictionary
BSSID (Basic Service Set identifier)
802.11g
42. An Ack is expected for every____ frame transmitted
Unicast
Wireless Game adapters and Media Bridges
Height of an RF signal
Dynamic Rate switching
43. the amplitude of an RF signal is
Dual radio APs
Restricts access to authorized users
Dictionary
Height of an RF signal
44. 802.11g LAN operates in what frequency range?
Antenna diversity
SSID (service set identifier)
Interoperability testing organization
2.4-2.5GHz
45. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
1 -6 -11
1
Deauth
25 MHz
46. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Fake auth
WPA Enterprise -WEP -MAC filters
Wi-Fi Alliance
Station (STA)
47. A basic service set (BSS) consists of how many access points
1
Watt and mW
Automatically monitor the network for attacks
Passive scan
48. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
Managed
802.11i
802.11w
49. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
7
802.11a
MAC
32
50. What type of certification came from 802.11i
ARP spoofing
Single radio AP's
WPA2
25 MHz