SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Three types of passive WEP attacks
Quality of Service
Brute force - statistical and dictionary
Point-to-point link
Station (STA)
2. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Deauth
Fakeauth
Interference from a neighboring access point RF denial-of-service (Dos) attack
Station (STA)
3. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
WPA2 -WEP
Basic Service Set (BSS)
Number of users and software applications in use
Restricts access to authorized users
4. WiMAX 802.16 authentication is based on...
FHSS
Other 802.11a devices
X.509 certificates on the subscriber side only.
802.11r
5. Management frames are sent in....
Active scanning
A VPN to the office network
Arp
Plaintext
6. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Repeater
Monitor
Fakeauth
32
7. A basic service set identifier (BSSID) is the MAC address of the ____
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
AP radio
1 -6 -11
Mesh network
8. WI-Fi Protected Setup was designed for which of the following wireless applications?
Obstacles
Mesh
Small Office/Home Office Organizations (SOHO)
BSSID (Basic Service Set identifier)
9. The security amendment to the IEEE 802.11 standard requires ____
CCMP
Personal mode and Enterprise Mode
Unencrypted
Restricts access to authorized users
10. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
32 character maximum and is case sensitive
AP to AP
Walled Garden.
802.11g
11. an 802.11b 2.4GHz channel is how wide in MHz?
22MHz wide
Height of an RF signal
40 bit
Three
12. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
1 - 5.5 and 11 Mbps
Trojan/Rogue APs
SSID and Channel
Station (STA)
13. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
802.11b
UNII
Unencrypted
Arp replay
14. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Frequency
PIN
Management
32
15. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Bridge mode
Unencrypted
Ad-Hoc
16. This is a topology in which two or more APs are connected by a common distribution system.
CA - Collision avoidance
Roaming
Extended Service Set (ESS)
Degradation
17. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Mesh
TKIP - optional RC4
Active scanning
18. A ______________ does not always use an omnidirectional antenna
Monitor
Point-to-point link
Station (STA)
AES = CCMP required
19. What two devices use RF to communicate
RTS/CTS
802.11n
Management
Transmitter and receiver
20. Probe requests are used by clients as part of the ____ process
DBi
ERP protection
Active scanning
Extended Service Set (ESS)
21. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
BSSID (Basic Service Set identifier)
SOHO brands that support WPS
Trojan/Rogue APs - Arp spoofing - DNS spoofing
22. Which security methods do 802.11g access points support?
Diffraction
802.11n
Repeater
WPA Enterprise -WEP -MAC filters
23. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Know the SSID and enter it manually
11
Passphrase
24. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
40 bit
IPSec
CTS attacks - Deauth attack - Association flood - Jamming
3
25. Aireplay-ng -0
HT 20 MHz protection mode
Deauth
Two
UNII
26. An independent basic service set (IBSS) consists of how many access points?
Captive portal
AES = CCMP required
Independent
0
27. The capacity of an access point is dependent upon which factors?
Independent
Managed
Workgroup Bridge mode.
Number of users and software applications in use
28. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Fakeauth
CA - Collision avoidance
BSSID (Basic Service Set identifier)
25 MHz
29. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
Passve Scanning
32
Interference from a neighboring access point RF denial-of-service (Dos) attack
30. What kind of Algorithm does WPA2 use?
AES = CCMP required
40 bit
Arp replay
802.11b HR/DSSS and 802.11 DSSS
31. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
1 -6 -11
IPSec
Passphrase
Mesh network
32. Which process is a VPN solution intended to provide for users connection to a network
Height of an RF signal
Secure Layer 3 transmissions over a public network infrastructure
Active mode
1 - 5.5 and 11 Mbps
33. 3 types of antennas
802.11n
Dictionary
802.11b HR/DSSS and 802.11 DSSS
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
34. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
A VPN to the office network
Three
802.11n
2.4-2.5GHz
35. The open system authentication process uses how many frames?
HT Non member protection mode
Restricts access to authorized users
Two
Captive portal
36. Bluetooth uses a radio technology called
0
25 MHz
Small Office/Home Office Organizations (SOHO)
FHSS
37. 802.11b is capable of which data rates?
1 - 5.5 and 11 Mbps
Degradation
Monitor
14
38. Name 3 channels considered non overlapping in the 2.4GHZ band
Secure Layer 3 transmissions over a public network infrastructure
Watt and mW
Acknowledgement frames
1 -6 -11
39. What algorithm does WEP use
RC4
802.11i
Monitor
Addresses wireless Quality of Service
40. ___ are used to describe the basic components and topology of a WLAN
1
RTS/CTS
Service sets
Spoof an address
41. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Brute force - statistical and dictionary
Fake auth
Amplitude and phase
Small Office/Home Office Organizations (SOHO)
42. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Dynamic Rate switching
FCC
RTS/CTS
LTE
43. Two authentication types defined in the 802.11 standard
Open system and Shared key
Open system
Interoperability testing organization
Client
44. 802.11 uses CSMA/...
CA - Collision avoidance
Workgroup Bridge mode.
Passive scan
Encryption
45. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
FCC
Active mode
Restricts access to authorized users
1
46. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
WPA/WPA2
Enter a username and password that will be central administered
Arp
47. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Degradation
Enter a username and password that will be central administered
Independent
Two
48. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
3
Mesh network
Repeater
49. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Antenna diversity
Single radio AP's
22MHz wide
802.11b HR/DSSS and 802.11 DSSS
50. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
802.11b
Indoor and outdoor
Refraction
Point-to-point link