Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What organization is responsible for unlicensed frequency band regulations in the United States?






2. 3 types of antennas






3. The length of a WEP key is typically ___ or ___






4. Three types of MITM attacks






5. Two authentication types defined in the 802.11 standard






6. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


7. Management frames are sent in....






8. What best describes the Wi-Fi alliance?






9. A ______________ does not always use an omnidirectional antenna






10. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






11. Which process is a VPN solution intended to provide for users connection to a network






12. In this mode - the card acts as a normal access point






13. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






14. Typically a point-to-multipoint link consists of ____ connections






15. The 802.11i amendment to the standard addresses which of the following technologies?






16. Layer 2 Tunneling Protocol commonly uses which encryption method?






17. High Throughput mode 0






18. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






19. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






20. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






21. Point to Point links typically use which antenna types?






22. Aireplay-ng -0






23. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






24. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






25. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






26. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






27. Probe requests are used by clients as part of the ____ process






28. Which if the following organizations is responsible for standards compliance?






29. 802.11w can only be used in networks using_____






30. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






31. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






32. Aireplay-ng -3






33. High Throughput mode 1






34. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






35. Give two examples of WGB devices.






36. The Layer 2 frame will be...






37. Collisions are detected through the use of....






38. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






39. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






40. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






41. 802.11 frames have a maximum 'upper-layer' payload of...






42. This is the default mode that sets the card as a client that could then connect to an AP






43. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






44. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






45. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






46. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






47. What algorithm does WEP use






48. As a device moves away from an access point - what is true regarding dynamic rate switching?






49. the amplitude of an RF signal is






50. A newly configured wireless intrusion prevention system will___