Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. High throughput mode 2






2. Wireless gateways come in two primary forms...






3. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






4. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






5. Point to Point links typically use which antenna types?






6. In order to set up an ad hoc network a user must know which two parameters?






7. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






8. What type of wireless network device is PIN-based security most commonly used with






9. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






10. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






11. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






12. Which items are unique to a service set identifier






13. Give two examples of WGB devices.






14. Which function does RBAC provide?






15. Aireplay-ng -3






16. A brute force attack is limited to breaking___ WEP keys






17. Three types of passive WEP attacks






18. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






19. As a device moves away from an access point - what is true regarding dynamic rate switching?






20. High Throughput mode 0






21. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






22. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






23. The Layer 2 frame will be...






24. The ___ acts as a hub for the WLAN; wireless frame pass through this device






25. 3 types of frames






26. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






27. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






28. This is typically the 48-bit MAC address of the access point's radio card.






29. A pre-shared key mode may be vulnerable to a ____ attack






30. 802.11b is capable of which data rates?






31. Aireplay-ng -0






32. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






33. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






34. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






35. In this mode - the card acts as a normal access point






36. an 802.11b 2.4GHz channel is how wide in MHz?






37. What organization is responsible for unlicensed frequency band regulations in the United States?






38. A weakness with MAC filtering is that it allows an intruder to ____






39. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






40. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






41. This sets the card to participate in an independent basic service set






42. Collisions are detected through the use of....






43. The radio card can operate in one of up to six possible modes of operation...






44. A ______________ does not always use an omnidirectional antenna






45. In bluetooth - one master may communicate with up to ___ slaves in a piconet






46. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






47. This is a topology in which two or more APs are connected by a common distribution system.






48. WPA was developed as an interim solution for which amendment to the 802.11 standards?






49. A station can act as a routing node in a wireless mesh network






50. Bridge mode will not allow client associations and is ______ only