SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11 uses CSMA/...
Residential and Enterprise
CA - Collision avoidance
802.11n
Mesh
2. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Enter a username and password that will be central administered
CA - Collision avoidance
Other 802.11a devices
Dynamic Rate switching
3. A weakness with MAC filtering is that it allows an intruder to ____
Frequency
Diffraction
64-bit - 128-bit
Spoof an address
4. ___ are used to describe the basic components and topology of a WLAN
Service sets
SSID and Channel
Reflection
Access point
5. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11r
Amplitude and phase
Wi-Fi Alliance
802.11
6. Management frames are sent in....
Plaintext
Watt and mW
Unencrypted
3
7. Typically a point-to-multipoint link consists of ____ connections
LTE
3
Dictionary
Three
8. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
2.4-2.5GHz
Authenticate - associate
CTS attacks - Deauth attack - Association flood - Jamming
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
9. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
One or more
Obstacles
Arp replay
Management
10. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Interference from a neighboring access point RF denial-of-service (Dos) attack
Know the SSID and enter it manually
802.11b
RC4
11. Probe requests are used by clients as part of the ____ process
Point-to-point link
Workgroup Bridge mode.
Active scanning
2304 bytes
12. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
ERP protection
64-bit - 128-bit
11
One or more
13. 802.11 frames have a maximum 'upper-layer' payload of...
Arp replay
Personal mode and Enterprise Mode
2304 bytes
WPA2
14. Aireplay-ng -0
Deauth
FHSS
Brute force - statistical and dictionary
CA - Collision avoidance
15. WiMAX 802.16 authentication is based on...
Wireless Game adapters and Media Bridges
X.509 certificates on the subscriber side only.
32 character maximum and is case sensitive
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
16. What algorithm does WEP use
Acknowledgement frames
Access point
RC4
Fake auth
17. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Three
Two
RC4
14
18. An Ack is expected for every____ frame transmitted
Arp replay
802.11b
Unicast
2.4-2.5GHz
19. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Fakeauth
Arp replay
RTS/CTS
20. What type of wireless network device is PIN-based security most commonly used with
DBi
SOHO brands that support WPS
Active scanning
4 channels
21. This is the default mode that sets the card as a client that could then connect to an AP
Managed
1 - 5.5 and 11 Mbps
Number of users and software applications in use
Encryption
22. The Access point can operate in a variety of modes...
Root mode
Plaintext
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
802.11
23. Three types of passive WEP attacks
Semi directional and Highly directional
Management - control - data
7
Brute force - statistical and dictionary
24. The open system authentication process uses how many frames?
Mesh network
Two
4 channels
Authentication
25. This type of authentication is essentially 'Null authentication'
Open system
Independent
Acknowledgement frames
TKIP - optional RC4
26. Wireless gateways come in two primary forms...
802.11b
Residential and Enterprise
FHSS
11
27. Bridge mode will not allow client associations and is ______ only
AP to AP
ARP spoofing
0
BSSID (Basic Service Set identifier)
28. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
Brute force - statistical and dictionary
Diffraction
ERP-OFDM - DSSS
29. A station can act as a routing node in a wireless mesh network
Mismatched SSID
A VPN to the office network
AP to AP
Mesh
30. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
32
WPA2 -WEP
Management
ARP spoofing
31. This is a topology in which two or more APs are connected by a common distribution system.
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Extended Service Set (ESS)
SOHO brands that support WPS
Trojan/Rogue APs
32. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
CA - Collision avoidance
Repeater
802.11n
33. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
32 character maximum and is case sensitive
Walled Garden.
64-bit - 128-bit
34. The length of a WEP key is typically ___ or ___
Independent
Extended Service Set (ESS)
64-bit - 128-bit
RTS/CTS
35. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Mesh network
Wavelength
ISM
Passive scan
36. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
WPA Enterprise -WEP -MAC filters
Quality of Service
Security
Trojan/Rogue APs
37. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Passve Scanning
Arp
Dictionary
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
38. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Mesh network
Roaming
802.11i
32
39. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Dictionary
Secure Layer 3 transmissions over a public network infrastructure
2.4-2.5GHz
7
40. A basic service set identifier (BSSID) is the MAC address of the ____
CA - Collision avoidance
Enter a username and password that will be central administered
Repeater
AP radio
41. Name two relative measures of power
802.11b
Indoor and outdoor
Personal mode and Enterprise Mode
DB and dBi
42. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
UNII
Automatically monitor the network for attacks
Extended Service Set (ESS)
3
43. WI-Fi Protected Setup was designed for which of the following wireless applications?
Fakeauth
Small Office/Home Office Organizations (SOHO)
DBi
11
44. The radio card can operate in one of up to six possible modes of operation...
Wavelength
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
CCMP
IPSec
45. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Frequency
Monitor
TKIP - optional RC4
Active mode
46. 802.11g LAN operates in what frequency range?
Managed
2.4-2.5GHz
UNII
AP to AP
47. 802.11b is capable of which data rates?
Captive portal
1 - 5.5 and 11 Mbps
Dual radio APs
802.11b
48. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Passve Scanning
Residential and Enterprise
TKIP - optional RC4
Fake auth
49. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Active mode
802.11a
Fakeauth
Diffraction
50. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
ERP protection
Amplitude and phase
Mismatched SSID
CCMP
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests