SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Collisions are detected through the use of....
CTS attacks - Deauth attack - Association flood - Jamming
Acknowledgement frames
Semi directional and Highly directional
Fakeauth
2. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
Interference from a neighboring access point RF denial-of-service (Dos) attack
802.11r
Mesh network
3. WPA was developed as an interim solution for which amendment to the 802.11 standards?
2.4-2.5GHz
Obstacles
802.11i
Independent
4. Aireplay-ng -0
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
SOHO brands that support WPS
Deauth
Walled Garden.
5. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
Diffraction
One or more
Carefully plan a strategy using WEP and VLANs
6. Aireplay-ng -3
25 MHz
Authenticate - associate
Arp
Refraction
7. In this mode - the card acts as a normal access point
Data rate increases
Active mode
OFDM
Master
8. 802.11b is capable of which data rates?
Refraction
CTS attacks - Deauth attack - Association flood - Jamming
1 - 5.5 and 11 Mbps
One or more
9. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Open system and Shared key
Obstacles
ERP protection
Mismatched SSID
10. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Number of users and software applications in use
Client
Carefully plan a strategy using WEP and VLANs
Acknowledgement frames
11. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Dynamic Rate switching
802.11a
Captive portal
CA - Collision avoidance
12. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
ERP protection
DBi
Passive scan
13. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
SOHO brands that support WPS
Fake auth
Two
14. What is regarded in 802.11e?
Transmitter and receiver
HT 20 MHz protection mode
MAC
Addresses wireless Quality of Service
15. The length of a WEP key is typically ___ or ___
Passphrase
64-bit - 128-bit
Repeater
Management - control - data
16. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
11
Refraction
Authentication
17. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
32
Ad-Hoc
Management - control - data
4 channels
18. The 802.11i amendment to the standard addresses which of the following technologies?
2304 bytes
Access point
AES = CCMP required
Security
19. This type of authentication is essentially 'Null authentication'
Open system
14
802.11w
Wireless gateways
20. A pre-shared key mode may be vulnerable to a ____ attack
WPA2 -WEP
PIN
One or more
Dictionary
21. What type of algorithm does WPA use
7
WPA Enterprise -WEP -MAC filters
WEP
TKIP - optional RC4
22. Probe requests are used by clients as part of the ____ process
Fakeauth
HT fixed mode
Active scanning
40 bit
23. A weakness with MAC filtering is that it allows an intruder to ____
One or more
Spoof an address
Independent
32 character maximum and is case sensitive
24. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Independent
Wireless gateways
Mesh network
25. Typically a point-to-multipoint link consists of ____ connections
Secure Layer 3 transmissions over a public network infrastructure
Three
HT 20 MHz protection mode
7
26. Management frames are sent in....
AP to AP
Plaintext
Antenna diversity
2.4-2.5GHz
27. Point to Point links typically use which antenna types?
Dynamic Rate switching
Refraction
Semi directional and Highly directional
Trojan/Rogue APs
28. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
OFDM
Authenticate - associate
Walled Garden.
802.11
29. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Single radio AP's
Mesh
Service sets
Antenna diversity
30. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
PIN
6 -12 - and 24 Mbps
Independent
DBi
31. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Unencrypted
Interference from a neighboring access point RF denial-of-service (Dos) attack
Diffraction
Walled Garden.
32. High Throughput mode 0
Greenfield mode
CCMP
PIN
One or more
33. The process in which a wireless LAN clients connection moves from one access point to another is called ______
UNII
Diffraction
Roaming
64-bit - 128-bit
34. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Root mode
Service sets
Reflection
3
35. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
RTS/CTS
1 -6 -11
6 -12 - and 24 Mbps
36. This is the default mode that sets the card as a client that could then connect to an AP
Wi-Fi Alliance
Obstacles
Managed
Frequency
37. Two characteristics of signals are
SSID and Channel
Arp
Amplitude and phase
PIN
38. High throughput mode 2
Passve Scanning
SSID (service set identifier)
HT 20 MHz protection mode
Access point
39. What item has an effect on RF line of site?
Obstacles
Repeater
802.11w
Brute force - statistical and dictionary
40. 802.11 uses CSMA/...
Trojan/Rogue APs - Arp spoofing - DNS spoofing
40 bit
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
CA - Collision avoidance
41. What two devices use RF to communicate
Obstacles
802.11b HR/DSSS and 802.11 DSSS
Transmitter and receiver
Single radio AP's
42. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
Open system and Shared key
40 bit
RC4
43. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
Watt and mW
WPA Enterprise -WEP -MAC filters
Three
44. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Managed
1 -6 -11
CCMP
802.11
45. As a device moves away from an access point - what is true regarding dynamic rate switching?
802.11a
Point-to-point link
Refraction
Data rate increases
46. 802.11a uses which spread spectrum technology?
CA - Collision avoidance
OFDM
14
6 -12 - and 24 Mbps
47. A ______________ does not always use an omnidirectional antenna
Addresses wireless Quality of Service
25 MHz
Point-to-point link
Mesh network
48. In repeater mode - the repeater device connects to a normal '___ mode'
40 bit
Unencrypted
Two
Root mode
49. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
HT Non member protection mode
Open system and Shared key
AES = CCMP required
50. The 802.11g standard uses which two speed spectrum technologies.
WPA Enterprise -WEP -MAC filters
Management
ERP-OFDM - DSSS
UNII
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests