SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The radio card can operate in one of up to six possible modes of operation...
0
Acknowledgement frames
Spoof an address
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
2. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Enter a username and password that will be central administered
A VPN to the office network
Amplitude and phase
Acknowledgement frames
3. Typically a point-to-multipoint link consists of ____ connections
Three
Ad-Hoc
Open system
Independent
4. Point to Point links typically use which antenna types?
Semi directional and Highly directional
802.11r
Security
MAC
5. A ______________ does not always use an omnidirectional antenna
7
802.11a
Enter a username and password that will be central administered
Point-to-point link
6. What organization is responsible for unlicensed frequency band regulations in the United States?
Repeater
One or more
FCC
802.11g
7. Wireless gateways come in two primary forms...
Reflection
Watt and mW
Residential and Enterprise
Addresses wireless Quality of Service
8. The Access point can operate in a variety of modes...
Root mode
802.11a
Brute force - statistical and dictionary
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
9. 3 types of antennas
Roaming
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Monitor
ARP spoofing
10. High throughput mode 2
Root mode
CTS attacks - Deauth attack - Association flood - Jamming
WEP
HT 20 MHz protection mode
11. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Single radio AP's
Authentication
12. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
3
Know the SSID and enter it manually
Carefully plan a strategy using WEP and VLANs
Quality of Service
13. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
HT Non member protection mode
Captive portal
Refraction
Residential and Enterprise
14. Management frames are sent in....
Plaintext
Captive portal
A VPN to the office network
Master
15. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
11
Single radio AP's
Interoperability testing organization
16. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
6 -12 - and 24 Mbps
TKIP - optional RC4
Mesh
Active mode
17. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
25 MHz
Other 802.11a devices
Enter a username and password that will be central administered
Arp
18. 802.11b is capable of which data rates?
Trojan/Rogue APs
Walled Garden.
ERP-OFDM - DSSS
1 - 5.5 and 11 Mbps
19. Which security feature provides the strongest security for a home-based wireless network?
Trojan/Rogue APs
25 MHz
Passphrase
Ad-Hoc
20. 802.11g LAN operates in what frequency range?
X.509 certificates on the subscriber side only.
Access point
2.4-2.5GHz
Passive scan
21. A weakness with MAC filtering is that it allows an intruder to ____
Fakeauth
Spoof an address
PIN
40 bit
22. An independent basic service set (IBSS) consists of how many access points?
Authentication
One or more
Trojan/Rogue APs - Arp spoofing - DNS spoofing
0
23. As a device moves away from an access point - what is true regarding dynamic rate switching?
32
1 -6 -11
Data rate increases
Management
24. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
ERP protection
ARP spoofing
Other 802.11a devices
Acknowledgement frames
25. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Three
Wavelength
Active scanning
26. What type of wireless network device is PIN-based security most commonly used with
Wavelength
Other 802.11a devices
SOHO brands that support WPS
Unencrypted
27. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Extended Service Set (ESS)
Monitor
Height of an RF signal
28. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Mismatched SSID
Passive scan
Repeater
Passphrase
29. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Semi directional and Highly directional
64-bit - 128-bit
Access point
802.11b
30. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Mesh
FHSS
Automatically monitor the network for attacks
31. What type of algorithm does WPA use
TKIP - optional RC4
ISM
2304 bytes
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
32. Aireplay-ng -1
Access point
Fakeauth
AP radio
WPA/WPA2
33. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
Secure Layer 3 transmissions over a public network infrastructure
802.11
Station (STA)
34. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
FHSS
Workgroup Bridge mode.
Independent
Fakeauth
35. the amplitude of an RF signal is
Passve Scanning
WPA Enterprise -WEP -MAC filters
Height of an RF signal
Other 802.11a devices
36. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Refraction
Restricts access to authorized users
11
Captive portal
37. Two characteristics of signals are
MAC
802.11a
Amplitude and phase
Authentication
38. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Repeater
Mesh network
802.11r
Workgroup Bridge mode.
39. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Degradation
Repeater
Frequency
40 bit
40. When RF passes or bends around an obstacle such as a building or column - the behavior is
Management
Deauth
Spoof an address
Diffraction
41. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
AP radio
WPA Enterprise -WEP -MAC filters
Access point
42. ____ is also known as the Protected management frame standard
7
802.11w
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Authentication
43. Name two absolute measures of RF power
64-bit - 128-bit
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Watt and mW
Walled Garden.
44. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Management - control - data
2304 bytes
PIN
Encryption
45. Which data encryption.authentication method is identified in the IEEE 802.11 standard
802.11r
Wireless Game adapters and Media Bridges
WEP
2304 bytes
46. Name 3 channels considered non overlapping in the 2.4GHZ band
1 -6 -11
Dynamic Rate switching
X.509 certificates on the subscriber side only.
Basic Service Set (BSS)
47. What is regarded in 802.11e?
Walled Garden.
Dictionary
Deauth
Addresses wireless Quality of Service
48. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
Walled Garden.
Data rate increases
Small Office/Home Office Organizations (SOHO)
49. Collisions are detected through the use of....
Plaintext
WPA/WPA2
CTS attacks - Deauth attack - Association flood - Jamming
Acknowledgement frames
50. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Spoof an address
Refraction
Single radio AP's
Dual radio APs