SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The association process happens after which phase?
Authentication
Data rate increases
A VPN to the office network
Wi-Fi Alliance
2. In repeater mode - the repeater device connects to a normal '___ mode'
Transmitter and receiver
Root mode
RTS/CTS
802.11a
3. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
A VPN to the office network
Mesh
Data rate increases
SSID and Channel
4. This type of authentication is essentially 'Null authentication'
FCC
Point-to-point link
Open system
FHSS
5. an 802.11b 2.4GHz channel is how wide in MHz?
Passive scan
SSID (service set identifier)
Addresses wireless Quality of Service
22MHz wide
6. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Passve Scanning
Workgroup Bridge mode.
Open system and Shared key
MAC
7. Probe requests are used by clients as part of the ____ process
3
Active scanning
WEP
PIN
8. Typically a point-to-multipoint link consists of ____ connections
One or more
Three
ERP protection
40 bit
9. 3 types of antennas
RC4
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
ERP-OFDM - DSSS
Three
10. Bridge mode will not allow client associations and is ______ only
Mismatched SSID
AP to AP
Quality of Service
Greenfield mode
11. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Service sets
Reflection
Personal mode and Enterprise Mode
Encryption
12. 802.11 uses CSMA/...
CA - Collision avoidance
Trojan/Rogue APs
HT Non member protection mode
X.509 certificates on the subscriber side only.
13. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
Obstacles
HT 20 MHz protection mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
14. Name 3 channels considered non overlapping in the 2.4GHZ band
Mesh network
1 -6 -11
Open system
Plaintext
15. This is typically the 48-bit MAC address of the access point's radio card.
IPSec
Personal mode and Enterprise Mode
Ad-Hoc
BSSID (Basic Service Set identifier)
16. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Brute force - statistical and dictionary
Height of an RF signal
Mismatched SSID
17. A basic service set identifier (BSSID) is the MAC address of the ____
Access point
Other 802.11a devices
AP radio
FCC
18. High throughput mode 2
2304 bytes
HT 20 MHz protection mode
Semi directional and Highly directional
Degradation
19. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Plaintext
AES = CCMP required
Unencrypted
20. What type of certification came from 802.11i
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
WPA 2.0 personal and WPS
Management
WPA2
21. ____ is also known as the Protected management frame standard
Captive portal
Mesh
FHSS
802.11w
22. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
11
HT 20 MHz protection mode
Management
Service sets
23. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
40 bit
802.11b
Walled Garden.
25 MHz
24. Bluetooth uses a radio technology called
1 - 5.5 and 11 Mbps
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Frequency
FHSS
25. High throughput mode 3
RTS/CTS
HT fixed mode
802.11g
Encryption
26. Beacons allow client devices to ____ for available LANS
Passive scan
UNII
SOHO brands that support WPS
6 -12 - and 24 Mbps
27. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
WPA2 -WEP
Deauth
Authentication
ARP spoofing
28. What kind of Algorithm does WPA2 use?
Addresses wireless Quality of Service
Unencrypted
Semi directional and Highly directional
AES = CCMP required
29. The open system authentication process uses how many frames?
Mesh network
Two
Deauth
Brute force - statistical and dictionary
30. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
14
Restricts access to authorized users
4 channels
802.11
31. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Carefully plan a strategy using WEP and VLANs
Know the SSID and enter it manually
802.11b
Dual radio APs
32. The 802.11g standard uses which two speed spectrum technologies.
Interoperability testing organization
Height of an RF signal
ERP-OFDM - DSSS
32 character maximum and is case sensitive
33. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Unicast
WPA 2.0 personal and WPS
SSID (service set identifier)
ARP spoofing
34. Give two examples of WGB devices.
Active mode
Point-to-point link
Wireless Game adapters and Media Bridges
14
35. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Know the SSID and enter it manually
Extended Service Set (ESS)
22MHz wide
32
36. 802.11g LAN operates in what frequency range?
Passphrase
2.4-2.5GHz
Know the SSID and enter it manually
802.11b
37. What item has an effect on RF line of site?
Obstacles
Fakeauth
WPA2
Point-to-point link
38. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
TKIP - optional RC4
ERP protection
802.11b HR/DSSS and 802.11 DSSS
Service sets
39. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Passphrase
AES = CCMP required
Other 802.11a devices
Deauth
40. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
Repeater
Workgroup Bridge mode.
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
41. The Layer 2 frame will be...
Open system
Unencrypted
Active mode
Arp
42. Point to Point links typically use which antenna types?
Active scanning
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Semi directional and Highly directional
WPA/WPA2
43. An independent basic service set (IBSS) consists of how many access points?
Other 802.11a devices
0
FCC
WPA Enterprise -WEP -MAC filters
44. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Captive portal
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Refraction
SOHO brands that support WPS
45. The security amendment to the IEEE 802.11 standard requires ____
AES = CCMP required
A VPN to the office network
CCMP
Monitor
46. The Access point can operate in a variety of modes...
Passphrase
Restricts access to authorized users
FHSS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
47. The radio card can operate in one of up to six possible modes of operation...
FCC
Independent
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Trojan/Rogue APs - Arp spoofing - DNS spoofing
48. What type of algorithm does WPA use
TKIP - optional RC4
Arp replay
Two
Client
49. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
AP to AP
Access point
Client
Fake auth
50. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
TKIP - optional RC4
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Unencrypted
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests