SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The open system authentication process uses how many frames?
Mesh
Two
Walled Garden.
Enter a username and password that will be central administered
2. This sets the card to participate in an independent basic service set
CA - Collision avoidance
3
Ad-Hoc
Workgroup Bridge mode.
3. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Workgroup Bridge mode.
Monitor
ARP spoofing
3
4. A newly configured wireless intrusion prevention system will___
ISM
DB and dBi
Automatically monitor the network for attacks
Active scanning
5. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Passve Scanning
11
1 -6 -11
HT fixed mode
6. In this mode a station can act as a relay or WLAN range extender
MAC
Obstacles
Dynamic Rate switching
Repeater
7. What type of certification came from 802.11i
Wi-Fi Alliance
WPA2
AP to AP
Watt and mW
8. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
Ad-Hoc
802.11a
802.11b HR/DSSS and 802.11 DSSS
9. A weakness with MAC filtering is that it allows an intruder to ____
Authenticate - associate
Spoof an address
Master
Service sets
10. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
MAC
Passve Scanning
WPA/WPA2
11. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Carefully plan a strategy using WEP and VLANs
802.11
WPA 2.0 personal and WPS
Dictionary
12. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
802.11a
64-bit - 128-bit
Degradation
13. Give two examples of WGB devices.
32
Point-to-point link
Wireless Game adapters and Media Bridges
WPA2
14. What is the gain of an antenna measured in
UNII
Master
Roaming
DBi
15. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Residential and Enterprise
802.11w
4 channels
Automatically monitor the network for attacks
16. These are user configurable and present in only five 802.11 frame types...
Interference from a neighboring access point RF denial-of-service (Dos) attack
Restricts access to authorized users
Security
Beacons - Probe request - Probe response - Association Request - Reassociation Request
17. A station can act as a routing node in a wireless mesh network
Frequency
Mesh
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Managed
18. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
40 bit
MAC
Active mode
ARP spoofing
19. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Wavelength
Secure Layer 3 transmissions over a public network infrastructure
Refraction
Walled Garden.
20. Name two relative measures of power
Interference from a neighboring access point RF denial-of-service (Dos) attack
DB and dBi
Carefully plan a strategy using WEP and VLANs
WPA 2.0 personal and WPS
21. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Enter a username and password that will be central administered
Management
Walled Garden.
1 -6 -11
22. 3 types of antennas
1 -6 -11
Dual radio APs
FCC
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
23. 3 types of frames
Number of users and software applications in use
HT 20 MHz protection mode
Frequency
Management - control - data
24. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Know the SSID and enter it manually
Authenticate - associate
Extended Service Set (ESS)
OFDM
25. The 802.11i amendment to the standard addresses which of the following technologies?
Security
Passve Scanning
One or more
Height of an RF signal
26. The association process happens after which phase?
Repeater
Authentication
Walled Garden.
Master
27. An Ack is expected for every____ frame transmitted
Unicast
22MHz wide
A VPN to the office network
Dynamic Rate switching
28. Beacons allow client devices to ____ for available LANS
Passive scan
Encryption
WPA Enterprise -WEP -MAC filters
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
29. Two characteristics of signals are
Passphrase
Amplitude and phase
32 character maximum and is case sensitive
Wavelength
30. A ______________ does not always use an omnidirectional antenna
2.4-2.5GHz
Station (STA)
Point-to-point link
1
31. The radio card can operate in one of up to six possible modes of operation...
WPA/WPA2
Extended Service Set (ESS)
802.11a
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
32. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
Three
Bridge mode
2304 bytes
33. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
SSID (service set identifier)
Spoof an address
Acknowledgement frames
Automatically monitor the network for attacks
34. What kind of Algorithm does WPA2 use?
SSID (service set identifier)
AES = CCMP required
Arp replay
Dynamic Rate switching
35. Wireless gateways come in two primary forms...
Active mode
Secure Layer 3 transmissions over a public network infrastructure
1
Residential and Enterprise
36. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
HT fixed mode
Fakeauth
Passive scan
Basic Service Set (BSS)
37. High Throughput mode 1
HT Non member protection mode
Wireless gateways
Unicast
AES = CCMP required
38. Two authentication types defined in the 802.11 standard
Client
Open system and Shared key
Station (STA)
WEP
39. The capacity of an access point is dependent upon which factors?
Transmitter and receiver
Repeater
Number of users and software applications in use
Root mode
40. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Fakeauth
Point-to-point link
Access point
PIN
41. Management frames are sent in....
Dynamic Rate switching
Automatically monitor the network for attacks
Mesh
Plaintext
42. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
802.11n
Carefully plan a strategy using WEP and VLANs
Trojan/Rogue APs
ISM
43. A basic service set (BSS) consists of how many access points
1
AES = CCMP required
802.11g
Secure Layer 3 transmissions over a public network infrastructure
44. An independent basic service set (IBSS) consists of how many access points?
Point-to-point link
11
0
Brute force - statistical and dictionary
45. Which process is a VPN solution intended to provide for users connection to a network
802.11b HR/DSSS and 802.11 DSSS
AP radio
Secure Layer 3 transmissions over a public network infrastructure
SOHO brands that support WPS
46. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
2.4-2.5GHz
Mesh network
Open system and Shared key
25 MHz
47. WiMAX 802.16 authentication is based on...
Diffraction
ERP-OFDM - DSSS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
X.509 certificates on the subscriber side only.
48. 802.11b is capable of which data rates?
1 - 5.5 and 11 Mbps
25 MHz
Management
AES = CCMP required
49. A brute force attack is limited to breaking___ WEP keys
22MHz wide
Semi directional and Highly directional
Diffraction
40 bit
50. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Deauth
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Management - control - data
WEP