Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What organization is responsible for unlicensed frequency band regulations in the United States?






2. What is regarded in 802.11e?






3. These are user configurable and present in only five 802.11 frame types...






4. The Access point can operate in a variety of modes...






5. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






6. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






7. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






8. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






9. Beacons allow client devices to ____ for available LANS






10. 3 types of frames






11. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






12. When RF passes or bends around an obstacle such as a building or column - the behavior is






13. An independent basic service set (IBSS) consists of how many access points?






14. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






15. 802.11w can only be used in networks using_____






16. The ___ acts as a hub for the WLAN; wireless frame pass through this device






17. Point to Point links typically use which antenna types?






18. A weakness with MAC filtering is that it allows an intruder to ____






19. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






20. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






21. High Throughput mode 0






22. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






23. A station can act as a routing node in a wireless mesh network






24. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






25. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






26. The process in which a wireless LAN clients connection moves from one access point to another is called ______






27. When an RF signal bounces off a smooth non absorptive surface - the behavior is






28. Three types of passive WEP attacks






29. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






30. A pre-shared key mode may be vulnerable to a ____ attack






31. Aireplay-ng -0






32. A service set identifier (SSID) has a maximum limit of how many characters?






33. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






34. Bluetooth uses a radio technology called






35. Which process is a VPN solution intended to provide for users connection to a network






36. High throughput mode 3






37. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






38. High Throughput mode 1






39. Two characteristics of signals are






40. 4 types of Denial of Service attacks






41. Collisions are detected through the use of....






42. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






43. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






44. What two devices use RF to communicate






45. Management frames are sent in....






46. Which if the following organizations is responsible for standards compliance?






47. A newly configured wireless intrusion prevention system will___






48. Aireplay-ng -3






49. A basic service set identifier (BSSID) is the MAC address of the ____






50. What type of algorithm does WPA use