Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which if the following organizations is responsible for standards compliance?






2. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






3. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






4. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






5. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






6. Which data encryption.authentication method is identified in the IEEE 802.11 standard






7. 802.11g LAN operates in what frequency range?






8. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






9. Wireless gateways come in two primary forms...






10. The length of a WEP key is typically ___ or ___






11. WiMAX 802.16 authentication is based on...






12. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






13. 802.11w can only be used in networks using_____






14. This sets the card to participate in an independent basic service set






15. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






16. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






17. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






18. According to the 802.11a amendment - which data rates are mandatory?






19. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






20. As a device moves away from an access point - what is true regarding dynamic rate switching?






21. Maximum length of data (Frame body) is 2304 when ____ is not in use






22. Name two absolute measures of RF power






23. These are user configurable and present in only five 802.11 frame types...






24. A basic service set identifier (BSSID) is the MAC address of the ____






25. Give two examples of WGB devices.






26. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






27. High throughput mode 2






28. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






29. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






30. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






31. 802.11b is capable of which data rates?






32. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






33. the amplitude of an RF signal is






34. 3 types of antennas






35. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






36. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






37. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






38. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






39. What type of algorithm does WPA use






40. This is typically the 48-bit MAC address of the access point's radio card.






41. The 802.11i amendment to the standard addresses which of the following technologies?






42. Point to Point links typically use which antenna types?






43. Probe requests are used by clients as part of the ____ process






44. What type of certification came from 802.11i






45. When a wireless LAN device listens for beacon frames - it is participating in which phase?






46. Which function does RBAC provide?






47. The security amendment to the IEEE 802.11 standard requires ____






48. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






49. In bluetooth - one master may communicate with up to ___ slaves in a piconet






50. This is a topology in which two or more APs are connected by a common distribution system.