Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which function does RBAC provide?






2. A brute force attack is limited to breaking___ WEP keys






3. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






4. Maximum length of data (Frame body) is 2304 when ____ is not in use






5. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






6. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






7. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






8. What type of certification came from 802.11i






9. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






10. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






11. What algorithm does WEP use






12. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






13. High throughput mode 2






14. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






15. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






16. WiMAX 802.16 authentication is based on...






17. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






18. The capacity of an access point is dependent upon which factors?






19. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






20. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






21. What is regarded in 802.11e?






22. Both ___ and ___ are wireless LAN security methods that support shared key security.






23. In order to set up an ad hoc network a user must know which two parameters?






24. In this mode a station can act as a relay or WLAN range extender






25. 802.11 frames have a maximum 'upper-layer' payload of...






26. 802.11 uses CSMA/...






27. Management frames are sent in....






28. Which security feature provides the strongest security for a home-based wireless network?






29. A station can act as a routing node in a wireless mesh network






30. Which security methods do 802.11g access points support?






31. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






32. The 802.11i amendment to the standard addresses which of the following technologies?






33. When RF passes or bends around an obstacle such as a building or column - the behavior is






34. High Throughput mode 1






35. What item has an effect on RF line of site?






36. In this mode - the card acts as a normal access point






37. Bluetooth uses a radio technology called






38. What type of algorithm does WPA use






39. WPA was developed as an interim solution for which amendment to the 802.11 standards?






40. What organization is responsible for unlicensed frequency band regulations in the United States?






41. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






42. A newly configured wireless intrusion prevention system will___






43. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






44. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






45. What is the gain of an antenna measured in






46. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






47. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






48. Collisions are detected through the use of....






49. Wireless gateways come in two primary forms...






50. High Throughput mode 0







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests