SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is regarded in 802.11e?
Addresses wireless Quality of Service
PIN
Management
Point-to-point link
2. According to the 802.11a amendment - which data rates are mandatory?
1 -6 -11
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Root mode
6 -12 - and 24 Mbps
3. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Fake auth
3
802.11r
802.11b
4. WiMAX 802.16 authentication is based on...
Wireless gateways
X.509 certificates on the subscriber side only.
RTS/CTS
Dual radio APs
5. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Management - control - data
Service sets
CCMP
Mesh network
6. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
4 channels
IPSec
1
Deauth
7. What item has an effect on RF line of site?
Brute force - statistical and dictionary
Wavelength
Obstacles
WEP
8. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Basic Service Set (BSS)
Monitor
Root mode
Repeater
9. A basic service set identifier (BSSID) is the MAC address of the ____
Wi-Fi Alliance
CA - Collision avoidance
A VPN to the office network
AP radio
10. Name 3 channels considered non overlapping in the 2.4GHZ band
ERP protection
One or more
WPA2 -WEP
1 -6 -11
11. A weakness with MAC filtering is that it allows an intruder to ____
HT 20 MHz protection mode
FCC
Spoof an address
Small Office/Home Office Organizations (SOHO)
12. Management frames are sent in....
Height of an RF signal
WPA2
Plaintext
802.11a
13. Maximum length of data (Frame body) is 2304 when ____ is not in use
Deauth
Encryption
FCC
Basic Service Set (BSS)
14. The security amendment to the IEEE 802.11 standard requires ____
0
4 channels
40 bit
CCMP
15. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
WPA 2.0 personal and WPS
Passve Scanning
Active mode
16. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
Repeater
Two
Captive portal
17. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
SSID (service set identifier)
Dynamic Rate switching
Number of users and software applications in use
One or more
18. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Independent
Frequency
802.11w
Secure Layer 3 transmissions over a public network infrastructure
19. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Deauth
Mesh network
Fake auth
Quality of Service
20. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
Monitor
RC4
Spoof an address
21. An Ack is expected for every____ frame transmitted
FCC
Monitor
Passve Scanning
Unicast
22. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Residential and Enterprise
Height of an RF signal
IPSec
23. 3 types of frames
ARP spoofing
Extended Service Set (ESS)
Management - control - data
Captive portal
24. What type of certification came from 802.11i
WPA2
Bridge mode
Deauth
UNII
25. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Dual radio APs
Encryption
25 MHz
Two
26. Collisions are detected through the use of....
Acknowledgement frames
40 bit
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
HT Non member protection mode
27. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
Brute force - statistical and dictionary
Enter a username and password that will be central administered
Secure Layer 3 transmissions over a public network infrastructure
28. Aireplay-ng -1
Workgroup Bridge mode.
Dynamic Rate switching
Mismatched SSID
Fakeauth
29. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
Automatically monitor the network for attacks
14
Passphrase
30. the amplitude of an RF signal is
Walled Garden.
Height of an RF signal
Residential and Enterprise
Personal mode and Enterprise Mode
31. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Security
ERP protection
Indoor and outdoor
RTS/CTS
32. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
33. 4 types of Denial of Service attacks
Secure Layer 3 transmissions over a public network infrastructure
Diffraction
Master
CTS attacks - Deauth attack - Association flood - Jamming
34. This is typically the 48-bit MAC address of the access point's radio card.
FCC
BSSID (Basic Service Set identifier)
7
Management
35. Which items are unique to a service set identifier
ARP spoofing
Unicast
Deauth
32 character maximum and is case sensitive
36. Which security methods do 802.11g access points support?
SSID and Channel
Carefully plan a strategy using WEP and VLANs
11
WPA Enterprise -WEP -MAC filters
37. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Active mode
Mesh
DBi
ISM
38. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Wireless gateways
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Passve Scanning
39. 802.11a uses which spread spectrum technology?
OFDM
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Mismatched SSID
802.11r
40. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
AP radio
Enter a username and password that will be central administered
Indoor and outdoor
25 MHz
41. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
802.11n
64-bit - 128-bit
Plaintext
Know the SSID and enter it manually
42. What algorithm does WEP use
32
Unencrypted
DBi
RC4
43. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Ad-Hoc
32 character maximum and is case sensitive
Point-to-point link
44. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Watt and mW
3
Residential and Enterprise
802.11i
45. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
11
PIN
Quality of Service
Antenna diversity
46. ___ are used to describe the basic components and topology of a WLAN
ERP-OFDM - DSSS
Dynamic Rate switching
Trojan/Rogue APs
Service sets
47. Three types of passive WEP attacks
Brute force - statistical and dictionary
Automatically monitor the network for attacks
Open system and Shared key
Workgroup Bridge mode.
48. What kind of Algorithm does WPA2 use?
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Secure Layer 3 transmissions over a public network infrastructure
AES = CCMP required
PIN
49. The Layer 2 frame will be...
Semi directional and Highly directional
Unencrypted
Brute force - statistical and dictionary
Wireless gateways
50. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
SSID (service set identifier)
Mismatched SSID
A VPN to the office network
Brute force - statistical and dictionary