Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The 802.11g standard uses which two speed spectrum technologies.






2. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






3. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






4. A basic service set (BSS) consists of how many access points






5. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






6. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






7. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






8. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






9. What type of algorithm does WPA use






10. This is a topology in which two or more APs are connected by a common distribution system.






11. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






12. This sets the card to participate in an independent basic service set






13. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






14. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






15. What type of wireless network device is PIN-based security most commonly used with






16. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






17. Two authentication types defined in the 802.11 standard






18. This is typically the 48-bit MAC address of the access point's radio card.






19. Management frames are sent in....






20. Which function does RBAC provide?






21. Maximum length of data (Frame body) is 2304 when ____ is not in use






22. The Access point can operate in a variety of modes...






23. Which security feature provides the strongest security for a home-based wireless network?






24. A service set identifier (SSID) has a maximum limit of how many characters?






25. This is the default mode that sets the card as a client that could then connect to an AP






26. These are user configurable and present in only five 802.11 frame types...






27. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






28. 3 types of frames






29. The association process happens after which phase?






30. Aireplay-ng -0






31. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


32. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi






33. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






34. What two devices use RF to communicate






35. In repeater mode - the repeater device connects to a normal '___ mode'






36. Name 3 channels considered non overlapping in the 2.4GHZ band






37. What algorithm does WEP use






38. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






39. The ___ acts as a hub for the WLAN; wireless frame pass through this device






40. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






41. Bridge mode will not allow client associations and is ______ only






42. Both ___ and ___ are wireless LAN security methods that support shared key security.






43. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






44. an 802.11b 2.4GHz channel is how wide in MHz?






45. When RF passes or bends around an obstacle such as a building or column - the behavior is






46. A newly configured wireless intrusion prevention system will___






47. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






48. A station can act as a routing node in a wireless mesh network






49. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






50. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s