SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What type of certification came from 802.11i
WPA2
WPA/WPA2
CCMP
Client
2. Which items are unique to a service set identifier
32 character maximum and is case sensitive
Arp replay
11
Client
3. 802.11 uses CSMA/...
Repeater
CA - Collision avoidance
Number of users and software applications in use
Captive portal
4. Bluetooth uses a radio technology called
Master
FHSS
802.11r
802.11
5. Name two absolute measures of RF power
Refraction
Wi-Fi Alliance
AP radio
Watt and mW
6. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
0
Restricts access to authorized users
25 MHz
DBi
7. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
Diffraction
802.11w
DB and dBi
8. According to the 802.11a amendment - which data rates are mandatory?
Wireless gateways
Passve Scanning
6 -12 - and 24 Mbps
Semi directional and Highly directional
9. In this mode - the card acts as a normal access point
802.11w
Frequency
Master
Open system
10. A station can act as a routing node in a wireless mesh network
Encryption
WPA2
Mesh
Acknowledgement frames
11. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Captive portal
Repeater
AP radio
1
12. The security amendment to the IEEE 802.11 standard requires ____
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Trojan/Rogue APs
CCMP
Workgroup Bridge mode.
13. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
Addresses wireless Quality of Service
Frequency
Wavelength
14. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
Basic Service Set (BSS)
WPA Enterprise -WEP -MAC filters
Arp replay
15. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
1
Residential and Enterprise
WPA/WPA2
16. High Throughput mode 0
1 - 5.5 and 11 Mbps
Greenfield mode
PIN
Reflection
17. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Station (STA)
Bridge mode
Brute force - statistical and dictionary
18. When RF passes or bends around an obstacle such as a building or column - the behavior is
25 MHz
MAC
Diffraction
0
19. WI-Fi Protected Setup was designed for which of the following wireless applications?
Fake auth
2.4-2.5GHz
Greenfield mode
Small Office/Home Office Organizations (SOHO)
20. Which process is a VPN solution intended to provide for users connection to a network
Repeater
Station (STA)
802.11b HR/DSSS and 802.11 DSSS
Secure Layer 3 transmissions over a public network infrastructure
21. This is the default mode that sets the card as a client that could then connect to an AP
Frequency
WPA2 -WEP
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Managed
22. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Two
802.11n
SSID (service set identifier)
23. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
802.11
CCMP
Workgroup Bridge mode.
1
24. As a device moves away from an access point - what is true regarding dynamic rate switching?
Refraction
WPA2 -WEP
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Data rate increases
25. These are user configurable and present in only five 802.11 frame types...
Client
Addresses wireless Quality of Service
Beacons - Probe request - Probe response - Association Request - Reassociation Request
1 - 5.5 and 11 Mbps
26. A service set identifier (SSID) has a maximum limit of how many characters?
AP to AP
Obstacles
32
FHSS
27. What type of algorithm does WPA use
3
Passphrase
TKIP - optional RC4
Open system and Shared key
28. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Repeater
Arp replay
Wi-Fi Alliance
29. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Residential and Enterprise
PIN
RC4
SSID and Channel
30. Probe requests are used by clients as part of the ____ process
Active scanning
Dynamic Rate switching
2.4-2.5GHz
Bridge mode
31. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
WPA Enterprise -WEP -MAC filters
32
Client
Automatically monitor the network for attacks
32. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
IPSec
14
SOHO brands that support WPS
33. A newly configured wireless intrusion prevention system will___
Quality of Service
Automatically monitor the network for attacks
Interference from a neighboring access point RF denial-of-service (Dos) attack
FHSS
34. What kind of Algorithm does WPA2 use?
PIN
Enter a username and password that will be central administered
Fakeauth
AES = CCMP required
35. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
802.11b HR/DSSS and 802.11 DSSS
Arp
Degradation
36. The Layer 2 frame will be...
Data rate increases
Automatically monitor the network for attacks
Unencrypted
WPA Enterprise -WEP -MAC filters
37. The association process happens after which phase?
WPA2
DB and dBi
Authentication
Independent
38. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Open system and Shared key
802.11i
Other 802.11a devices
Bridge mode
39. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Three
Data rate increases
Authenticate - associate
40. What algorithm does WEP use
RC4
Access point
1 - 5.5 and 11 Mbps
Quality of Service
41. The length of a WEP key is typically ___ or ___
1
2304 bytes
ARP spoofing
64-bit - 128-bit
42. High throughput mode 3
Secure Layer 3 transmissions over a public network infrastructure
DBi
Brute force - statistical and dictionary
HT fixed mode
43. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
CA - Collision avoidance
Wavelength
802.11b
44. A basic service set identifier (BSSID) is the MAC address of the ____
802.11g
AP radio
WEP
Enter a username and password that will be central administered
45. What type of wireless network device is PIN-based security most commonly used with
RC4
Dictionary
Unencrypted
SOHO brands that support WPS
46. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Deauth
Access point
Acknowledgement frames
802.11i
47. Typically a point-to-multipoint link consists of ____ connections
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
4 channels
Three
Wireless Game adapters and Media Bridges
48. Point to Point links typically use which antenna types?
64-bit - 128-bit
ARP spoofing
HT 20 MHz protection mode
Semi directional and Highly directional
49. The 802.11g standard uses which two speed spectrum technologies.
ERP-OFDM - DSSS
SSID and Channel
Unicast
ARP spoofing
50. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Personal mode and Enterprise Mode
Addresses wireless Quality of Service
AP to AP