Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ______________ does not always use an omnidirectional antenna






2. What type of wireless network device is PIN-based security most commonly used with






3. High throughput mode 2






4. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






5. In order to set up an ad hoc network a user must know which two parameters?






6. A basic service set identifier (BSSID) is the MAC address of the ____






7. Aireplay-ng -3






8. 802.11b is capable of which data rates?






9. Which data encryption.authentication method is identified in the IEEE 802.11 standard






10. WI-Fi Protected Setup was designed for which of the following wireless applications?






11. A weakness with MAC filtering is that it allows an intruder to ____






12. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






13. 802.11g LAN operates in what frequency range?






14. The 802.11i amendment to the standard addresses which of the following technologies?






15. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






16. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






17. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






18. 802.11 frames have a maximum 'upper-layer' payload of...






19. This sets the card to participate in an independent basic service set






20. Which if the following organizations is responsible for standards compliance?






21. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






22. When a wireless LAN device listens for beacon frames - it is participating in which phase?






23. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






24. An independent basic service set (IBSS) consists of how many access points?






25. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






26. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






27. an 802.11b 2.4GHz channel is how wide in MHz?






28. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






29. According to the 802.11a amendment - which data rates are mandatory?






30. ___ are used to describe the basic components and topology of a WLAN






31. Aireplay-ng -1






32. An Ack is expected for every____ frame transmitted






33. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






34. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






35. Typically a point-to-multipoint link consists of ____ connections






36. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






37. This is a topology in which two or more APs are connected by a common distribution system.






38. The Layer 2 frame will be...






39. Bluetooth uses a radio technology called






40. In bluetooth - one master may communicate with up to ___ slaves in a piconet






41. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






42. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






43. 4 types of Denial of Service attacks






44. As a device moves away from an access point - what is true regarding dynamic rate switching?






45. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






46. 802.11a uses which spread spectrum technology?






47. Both ___ and ___ are wireless LAN security methods that support shared key security.






48. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






49. A pre-shared key mode may be vulnerable to a ____ attack






50. Which process is a VPN solution intended to provide for users connection to a network







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests