Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ___ acts as a hub for the WLAN; wireless frame pass through this device






2. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






3. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






4. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






5. This is the default mode that sets the card as a client that could then connect to an AP






6. Which security methods do 802.11g access points support?






7. The Access point can operate in a variety of modes...






8. an 802.11b 2.4GHz channel is how wide in MHz?






9. When an RF signal bounces off a smooth non absorptive surface - the behavior is






10. A service set identifier (SSID) has a maximum limit of how many characters?






11. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






12. What type of algorithm does WPA use






13. In this mode a station can act as a relay or WLAN range extender






14. What is the gain of an antenna measured in






15. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


16. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






17. Which items are unique to a service set identifier






18. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






19. High throughput mode 3






20. What is regarded in 802.11e?






21. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






22. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






23. A basic service set (BSS) consists of how many access points






24. The Layer 2 frame will be...






25. Which data encryption.authentication method is identified in the IEEE 802.11 standard






26. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






27. When a wireless LAN device listens for beacon frames - it is participating in which phase?






28. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






29. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






30. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






31. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






32. WPA was developed as an interim solution for which amendment to the 802.11 standards?






33. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






34. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






35. A newly configured wireless intrusion prevention system will___






36. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






37. 802.11w can only be used in networks using_____






38. What two devices use RF to communicate






39. An Ack is expected for every____ frame transmitted






40. Name two absolute measures of RF power






41. Two characteristics of signals are






42. High Throughput mode 0






43. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






44. Beacons allow client devices to ____ for available LANS






45. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






46. In this mode - the card acts as a normal access point






47. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






48. Two authentication types defined in the 802.11 standard






49. What type of wireless network device is PIN-based security most commonly used with






50. Aireplay-ng -3