Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In this mode a station can act as a relay or WLAN range extender






2. What type of certification came from 802.11i






3. What organization is responsible for unlicensed frequency band regulations in the United States?






4. According to the 802.11a amendment - which data rates are mandatory?






5. 802.11a uses which spread spectrum technology?






6. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






7. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






8. A basic service set (BSS) consists of how many access points






9. This is the default mode that sets the card as a client that could then connect to an AP






10. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






11. High throughput mode 2






12. Three types of passive WEP attacks






13. This is typically the 48-bit MAC address of the access point's radio card.






14. In order to set up an ad hoc network a user must know which two parameters?






15. The process in which a wireless LAN clients connection moves from one access point to another is called ______






16. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






17. Layer 2 Tunneling Protocol commonly uses which encryption method?






18. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






19. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...






20. 3 types of antennas






21. ___ are used to describe the basic components and topology of a WLAN






22. High throughput mode 3






23. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






24. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






25. Both ___ and ___ are wireless LAN security methods that support shared key security.






26. Probe requests are used by clients as part of the ____ process






27. WiMAX 802.16 authentication is based on...






28. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






29. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






30. Name two absolute measures of RF power






31. What best describes the Wi-Fi alliance?






32. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






33. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






34. This sets the card to participate in an independent basic service set






35. The open system authentication process uses how many frames?






36. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






37. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






38. Which security feature provides the strongest security for a home-based wireless network?






39. WI-Fi Protected Setup was designed for which of the following wireless applications?






40. Two authentication types defined in the 802.11 standard






41. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






42. Which data encryption.authentication method is identified in the IEEE 802.11 standard






43. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






44. 4 types of Denial of Service attacks






45. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


46. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






47. Bluetooth uses a radio technology called






48. In this mode - the card acts as a normal access point






49. An Ack is expected for every____ frame transmitted






50. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.