SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A service set identifier (SSID) has a maximum limit of how many characters?
ARP spoofing
32
Brute force - statistical and dictionary
Open system and Shared key
2. This is a topology in which two or more APs are connected by a common distribution system.
802.11g
Extended Service Set (ESS)
BSSID (Basic Service Set identifier)
IPSec
3. An Ack is expected for every____ frame transmitted
Point-to-point link
Arp replay
Unicast
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
4. Wireless gateways come in two primary forms...
Residential and Enterprise
AP to AP
Repeater
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
5. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
3
Wavelength
Root mode
Refraction
6. What is the gain of an antenna measured in
DBi
4 channels
WPA2 -WEP
Passve Scanning
7. Collisions are detected through the use of....
802.11i
Acknowledgement frames
WPA/WPA2
Deauth
8. This sets the card to participate in an independent basic service set
Number of users and software applications in use
Mesh
Ad-Hoc
802.11
9. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Encryption
Deauth
ISM
10. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Security
Refraction
Reflection
WPA2 -WEP
11. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
SSID (service set identifier)
64-bit - 128-bit
802.11r
12. The security amendment to the IEEE 802.11 standard requires ____
CCMP
64-bit - 128-bit
Beacons - Probe request - Probe response - Association Request - Reassociation Request
DB and dBi
13. 802.11 uses CSMA/...
CA - Collision avoidance
Repeater
Managed
ERP-OFDM - DSSS
14. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Management
OFDM
Arp replay
15. ___ are used to describe the basic components and topology of a WLAN
Service sets
Authenticate - associate
Root mode
802.11i
16. What two devices use RF to communicate
22MHz wide
HT fixed mode
Transmitter and receiver
7
17. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Brute force - statistical and dictionary
0
Master
11
18. These are user configurable and present in only five 802.11 frame types...
Brute force - statistical and dictionary
Trojan/Rogue APs
25 MHz
Beacons - Probe request - Probe response - Association Request - Reassociation Request
19. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
1 - 5.5 and 11 Mbps
OFDM
Degradation
20. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
802.11g
Quality of Service
Authentication
PIN
21. As a device moves away from an access point - what is true regarding dynamic rate switching?
Addresses wireless Quality of Service
Data rate increases
Walled Garden.
ARP spoofing
22. Which security methods do 802.11g access points support?
CTS attacks - Deauth attack - Association flood - Jamming
WPA Enterprise -WEP -MAC filters
Open system
Frequency
23. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Active scanning
14
Repeater
HT fixed mode
24. A weakness with MAC filtering is that it allows an intruder to ____
OFDM
MAC
Spoof an address
Interference from a neighboring access point RF denial-of-service (Dos) attack
25. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Passive scan
Residential and Enterprise
Wireless gateways
ISM
26. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
1
0
Know the SSID and enter it manually
Unicast
27. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Automatically monitor the network for attacks
Height of an RF signal
RTS/CTS
Residential and Enterprise
28. Which items are unique to a service set identifier
CTS attacks - Deauth attack - Association flood - Jamming
32 character maximum and is case sensitive
BSSID (Basic Service Set identifier)
Greenfield mode
29. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Mesh
MAC
LTE
AP to AP
30. A basic service set identifier (BSSID) is the MAC address of the ____
SSID (service set identifier)
Security
AP radio
Antenna diversity
31. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Passphrase
PIN
Trojan/Rogue APs
Spoof an address
32. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Mesh
Other 802.11a devices
2.4-2.5GHz
802.11g
33. Two characteristics of signals are
Amplitude and phase
Roaming
Repeater
WPA2 -WEP
34. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
PIN
802.11b
Other 802.11a devices
Authenticate - associate
35. Name two relative measures of power
RTS/CTS
Height of an RF signal
64-bit - 128-bit
DB and dBi
36. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Greenfield mode
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
MAC
ISM
37. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
802.11r
Trojan/Rogue APs - Arp spoofing - DNS spoofing
WPA 2.0 personal and WPS
Arp replay
38. Aireplay-ng -1
Encryption
Authenticate - associate
Fakeauth
Degradation
39. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Encryption
Addresses wireless Quality of Service
Passive scan
40. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Dual radio APs
ERP-OFDM - DSSS
Passve Scanning
Know the SSID and enter it manually
41. A newly configured wireless intrusion prevention system will___
Height of an RF signal
Master
2.4-2.5GHz
Automatically monitor the network for attacks
42. WiMAX 802.16 authentication is based on...
X.509 certificates on the subscriber side only.
Wireless gateways
Service sets
802.11r
43. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
Access point
FCC
SSID (service set identifier)
44. A ______________ does not always use an omnidirectional antenna
Point-to-point link
Obstacles
1 -6 -11
Plaintext
45. The 802.11g standard uses which two speed spectrum technologies.
WPA2
Workgroup Bridge mode.
Automatically monitor the network for attacks
ERP-OFDM - DSSS
46. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
One or more
A VPN to the office network
Client
Interoperability testing organization
47. A station can act as a routing node in a wireless mesh network
Unencrypted
MAC
Mesh
802.11a
48. The Layer 2 frame will be...
Unencrypted
Managed
Extended Service Set (ESS)
802.11n
49. Name 3 channels considered non overlapping in the 2.4GHZ band
Degradation
1 -6 -11
2304 bytes
Open system
50. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Interference from a neighboring access point RF denial-of-service (Dos) attack
32
Refraction
Captive portal