Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is a topology in which two or more APs are connected by a common distribution system.






2. Aireplay-ng -3






3. A station can act as a routing node in a wireless mesh network






4. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






5. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






6. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






7. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






8. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






9. The Access point can operate in a variety of modes...






10. Three types of passive WEP attacks






11. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






12. the amplitude of an RF signal is






13. Beacons allow client devices to ____ for available LANS






14. What type of certification came from 802.11i






15. Both ___ and ___ are wireless LAN security methods that support shared key security.






16. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






17. Bridge mode will not allow client associations and is ______ only






18. The radio card can operate in one of up to six possible modes of operation...






19. WI-Fi Protected Setup was designed for which of the following wireless applications?






20. The 802.11i amendment to the standard addresses which of the following technologies?






21. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






22. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






23. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






24. The process in which a wireless LAN clients connection moves from one access point to another is called ______






25. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






26. High throughput mode 2






27. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






28. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






29. Which function does RBAC provide?






30. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






31. When a wireless LAN device listens for beacon frames - it is participating in which phase?






32. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






33. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






34. 802.11g LAN operates in what frequency range?






35. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






36. Which items are unique to a service set identifier






37. When an RF signal bounces off a smooth non absorptive surface - the behavior is






38. In this mode - the card acts as a normal access point






39. Name two relative measures of power






40. WiMAX 802.16 authentication is based on...






41. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






42. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






43. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






44. Which if the following organizations is responsible for standards compliance?






45. High Throughput mode 0






46. The Layer 2 frame will be...






47. An independent basic service set (IBSS) consists of how many access points?






48. 802.11 uses CSMA/...






49. In repeater mode - the repeater device connects to a normal '___ mode'






50. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO