Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two characteristics of signals are






2. ___ are used to describe the basic components and topology of a WLAN






3. A weakness with MAC filtering is that it allows an intruder to ____






4. In bluetooth - one master may communicate with up to ___ slaves in a piconet






5. The ___ acts as a hub for the WLAN; wireless frame pass through this device






6. Which process is a VPN solution intended to provide for users connection to a network






7. What best describes the Wi-Fi alliance?






8. Typically a point-to-multipoint link consists of ____ connections






9. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






10. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






11. Aireplay-ng -1






12. the amplitude of an RF signal is






13. 802.11 uses CSMA/...






14. The radio card can operate in one of up to six possible modes of operation...






15. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






16. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






17. Layer 2 Tunneling Protocol commonly uses which encryption method?






18. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






19. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






20. According to the 802.11a amendment - which data rates are mandatory?






21. In this mode a station can act as a relay or WLAN range extender






22. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






23. an 802.11b 2.4GHz channel is how wide in MHz?






24. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






25. What type of certification came from 802.11i






26. Name two relative measures of power






27. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






28. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






29. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






30. This sets the card to participate in an independent basic service set






31. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






32. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






33. As a device moves away from an access point - what is true regarding dynamic rate switching?






34. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






35. Bridge mode will not allow client associations and is ______ only






36. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






37. ____ is also known as the Protected management frame standard






38. Which data encryption.authentication method is identified in the IEEE 802.11 standard






39. 802.11a uses which spread spectrum technology?






40. The 802.11g standard uses which two speed spectrum technologies.






41. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






42. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






43. Give two examples of WGB devices.






44. Which items are unique to a service set identifier






45. A station can act as a routing node in a wireless mesh network






46. Collisions are detected through the use of....






47. The Access point can operate in a variety of modes...






48. An Ack is expected for every____ frame transmitted






49. Name 3 channels considered non overlapping in the 2.4GHZ band






50. Management frames are sent in....