Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -0






2. 3 types of antennas






3. When RF passes or bends around an obstacle such as a building or column - the behavior is






4. Which function does RBAC provide?






5. Give two examples of WGB devices.






6. A ______________ does not always use an omnidirectional antenna






7. What is the gain of an antenna measured in






8. Name two relative measures of power






9. What type of wireless network device is PIN-based security most commonly used with






10. Management frames are sent in....






11. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






12. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






13. A brute force attack is limited to breaking___ WEP keys






14. This type of authentication is essentially 'Null authentication'






15. Wireless gateways come in two primary forms...






16. Three types of passive WEP attacks






17. Both ___ and ___ are wireless LAN security methods that support shared key security.






18. A weakness with MAC filtering is that it allows an intruder to ____






19. A pre-shared key mode may be vulnerable to a ____ attack






20. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






21. The Layer 2 frame will be...






22. A service set identifier (SSID) has a maximum limit of how many characters?






23. This is typically the 48-bit MAC address of the access point's radio card.






24. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






25. High Throughput mode 0






26. The association process happens after which phase?






27. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






28. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






29. Which items are unique to a service set identifier






30. Beacons allow client devices to ____ for available LANS






31. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






32. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






33. High throughput mode 3






34. This is a topology in which two or more APs are connected by a common distribution system.






35. Which if the following organizations is responsible for standards compliance?






36. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






37. Aireplay-ng -3






38. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






39. 802.11a uses which spread spectrum technology?






40. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






41. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






42. An Ack is expected for every____ frame transmitted






43. the amplitude of an RF signal is






44. 802.11g LAN operates in what frequency range?






45. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






46. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






47. A basic service set (BSS) consists of how many access points






48. 4 types of Denial of Service attacks






49. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






50. What type of certification came from 802.11i