SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Extended Service Set (ESS)
Refraction
Monitor
Station (STA)
2. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Independent
BSSID (Basic Service Set identifier)
7
802.11b HR/DSSS and 802.11 DSSS
3. What type of algorithm does WPA use
Point-to-point link
TKIP - optional RC4
Active mode
Know the SSID and enter it manually
4. WiMAX 802.16 authentication is based on...
X.509 certificates on the subscriber side only.
Service sets
1 - 5.5 and 11 Mbps
802.11n
5. The 802.11g standard uses which two speed spectrum technologies.
ERP-OFDM - DSSS
Amplitude and phase
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
RTS/CTS
6. Which function does RBAC provide?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Restricts access to authorized users
Diffraction
Automatically monitor the network for attacks
7. A weakness with MAC filtering is that it allows an intruder to ____
Beacons - Probe request - Probe response - Association Request - Reassociation Request
2304 bytes
Spoof an address
Management
8. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Ad-Hoc
Workgroup Bridge mode.
One or more
9. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Dynamic Rate switching
AES = CCMP required
Transmitter and receiver
802.11g
10. When an RF signal bounces off a smooth non absorptive surface - the behavior is
ERP-OFDM - DSSS
Arp replay
Reflection
Secure Layer 3 transmissions over a public network infrastructure
11. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Management
Mismatched SSID
Number of users and software applications in use
12. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Degradation
802.11n
Small Office/Home Office Organizations (SOHO)
Addresses wireless Quality of Service
13. Three types of passive WEP attacks
RTS/CTS
UNII
802.11g
Brute force - statistical and dictionary
14. In order to set up an ad hoc network a user must know which two parameters?
802.11n
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Arp
SSID and Channel
15. High throughput mode 3
Beacons - Probe request - Probe response - Association Request - Reassociation Request
HT fixed mode
MAC
Master
16. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
ARP spoofing
Authentication
14
Mesh network
17. Bridge mode will not allow client associations and is ______ only
AP to AP
Encryption
14
Brute force - statistical and dictionary
18. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
1 - 5.5 and 11 Mbps
802.11n
Frequency
Root mode
19. According to the 802.11a amendment - which data rates are mandatory?
Unencrypted
6 -12 - and 24 Mbps
Know the SSID and enter it manually
Fake auth
20. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
Active scanning
A VPN to the office network
Roaming
21. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Enter a username and password that will be central administered
Interference from a neighboring access point RF denial-of-service (Dos) attack
Other 802.11a devices
Acknowledgement frames
22. Management frames are sent in....
Plaintext
Spoof an address
802.11i
Arp replay
23. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Reflection
ISM
RC4
HT 20 MHz protection mode
24. The Access point can operate in a variety of modes...
ARP spoofing
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Monitor
Indoor and outdoor
25. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Active mode
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Refraction
Authentication
26. The 802.11i amendment to the standard addresses which of the following technologies?
Wavelength
Security
32 character maximum and is case sensitive
Workgroup Bridge mode.
27. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
WPA2
Spoof an address
Access point
28. What best describes the Wi-Fi alliance?
Frequency
Interoperability testing organization
Unencrypted
Management - control - data
29. What algorithm does WEP use
ISM
Automatically monitor the network for attacks
Bridge mode
RC4
30. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
ARP spoofing
Dynamic Rate switching
Fake auth
Management
31. 3 types of antennas
Greenfield mode
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Interference from a neighboring access point RF denial-of-service (Dos) attack
Active scanning
32. Beacons allow client devices to ____ for available LANS
802.11i
802.11a
Passive scan
802.11w
33. The open system authentication process uses how many frames?
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Root mode
Two
11
34. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Access point
802.11i
2.4-2.5GHz
35. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
Basic Service Set (BSS)
Arp replay
802.11
36. Which items are unique to a service set identifier
ISM
Indoor and outdoor
32 character maximum and is case sensitive
ARP spoofing
37. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
802.11a
802.11g
Mesh
MAC
38. Aireplay-ng -0
Deauth
2304 bytes
Station (STA)
WPA2
39. Aireplay-ng -1
Enter a username and password that will be central administered
Fakeauth
Trojan/Rogue APs
Beacons - Probe request - Probe response - Association Request - Reassociation Request
40. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Workgroup Bridge mode.
WPA 2.0 personal and WPS
Open system
Indoor and outdoor
41. A ______________ does not always use an omnidirectional antenna
Wireless gateways
Point-to-point link
Arp
1 -6 -11
42. Point to Point links typically use which antenna types?
Semi directional and Highly directional
Station (STA)
Managed
Trojan/Rogue APs - Arp spoofing - DNS spoofing
43. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
Refraction
6 -12 - and 24 Mbps
Dual radio APs
44. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Data rate increases
CCMP
Frequency
One or more
45. 802.11b is capable of which data rates?
Indoor and outdoor
Wi-Fi Alliance
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
1 - 5.5 and 11 Mbps
46. A station can act as a routing node in a wireless mesh network
WPA2 -WEP
WPA2
Mesh
X.509 certificates on the subscriber side only.
47. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
RC4
Number of users and software applications in use
Point-to-point link
48. Maximum length of data (Frame body) is 2304 when ____ is not in use
TKIP - optional RC4
SSID (service set identifier)
Encryption
FHSS
49. Give two examples of WGB devices.
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Access point
Greenfield mode
Wireless Game adapters and Media Bridges
50. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Diffraction
Open system
MAC
AP to AP