SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Carefully plan a strategy using WEP and VLANs
Monitor
Mesh network
ARP spoofing
2. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
802.11n
Basic Service Set (BSS)
ERP-OFDM - DSSS
Three
3. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
One or more
Dynamic Rate switching
Plaintext
Bridge mode
4. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Unencrypted
6 -12 - and 24 Mbps
ERP protection
Captive portal
5. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
Wi-Fi Alliance
Other 802.11a devices
22MHz wide
6. an 802.11b 2.4GHz channel is how wide in MHz?
Dictionary
22MHz wide
SOHO brands that support WPS
Number of users and software applications in use
7. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
MAC
Height of an RF signal
Mesh network
Access point
8. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Other 802.11a devices
802.11g
9. 802.11w can only be used in networks using_____
BSSID (Basic Service Set identifier)
WPA/WPA2
PIN
3
10. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
802.11w
802.11
Trojan/Rogue APs - Arp spoofing - DNS spoofing
11. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
Fakeauth
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Encryption
12. What two devices use RF to communicate
Transmitter and receiver
Open system
Other 802.11a devices
802.11n
13. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Mesh
Trojan/Rogue APs - Arp spoofing - DNS spoofing
SSID (service set identifier)
Refraction
14. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
DB and dBi
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Frequency
Quality of Service
15. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
Client
Beacons - Probe request - Probe response - Association Request - Reassociation Request
WPA2
16. 3 types of frames
Management - control - data
Wireless Game adapters and Media Bridges
HT 20 MHz protection mode
Repeater
17. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Reflection
Encryption
802.11a
18. Name two relative measures of power
Wireless Game adapters and Media Bridges
Other 802.11a devices
DB and dBi
Passve Scanning
19. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Amplitude and phase
Diffraction
Roaming
802.11
20. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Transmitter and receiver
ISM
Workgroup Bridge mode.
4 channels
21. What is the gain of an antenna measured in
Indoor and outdoor
DBi
14
UNII
22. A ______________ does not always use an omnidirectional antenna
SSID (service set identifier)
HT 20 MHz protection mode
Interoperability testing organization
Point-to-point link
23. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Dual radio APs
Passphrase
Passive scan
MAC
24. High Throughput mode 1
3
HT Non member protection mode
Dual radio APs
Know the SSID and enter it manually
25. In this mode - the card acts as a normal access point
FHSS
3
Master
Authenticate - associate
26. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
PIN
Addresses wireless Quality of Service
Obstacles
Access point
27. 802.11a uses which spread spectrum technology?
CTS attacks - Deauth attack - Association flood - Jamming
40 bit
OFDM
Degradation
28. Two characteristics of signals are
Transmitter and receiver
IPSec
Amplitude and phase
AES = CCMP required
29. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Trojan/Rogue APs - Arp spoofing - DNS spoofing
1 - 5.5 and 11 Mbps
Transmitter and receiver
30. The association process happens after which phase?
Authentication
Dictionary
Plaintext
Passve Scanning
31. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
Data rate increases
Automatically monitor the network for attacks
Mesh
32. Name 3 channels considered non overlapping in the 2.4GHZ band
1 -6 -11
BSSID (Basic Service Set identifier)
Automatically monitor the network for attacks
Interoperability testing organization
33. A basic service set (BSS) consists of how many access points
802.11i
Management
1
1 -6 -11
34. A brute force attack is limited to breaking___ WEP keys
40 bit
14
Greenfield mode
MAC
35. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Arp replay
One or more
FHSS
Passphrase
36. This type of authentication is essentially 'Null authentication'
Spoof an address
Addresses wireless Quality of Service
Access point
Open system
37. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Degradation
Wireless gateways
Antenna diversity
SSID (service set identifier)
38. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Mesh network
Interference from a neighboring access point RF denial-of-service (Dos) attack
ISM
39. This is the default mode that sets the card as a client that could then connect to an AP
WPA 2.0 personal and WPS
Managed
Security
Repeater
40. A service set identifier (SSID) has a maximum limit of how many characters?
Small Office/Home Office Organizations (SOHO)
32
Monitor
Carefully plan a strategy using WEP and VLANs
41. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
X.509 certificates on the subscriber side only.
PIN
14
42. Which security methods do 802.11g access points support?
Secure Layer 3 transmissions over a public network infrastructure
WPA Enterprise -WEP -MAC filters
Authentication
Security
43. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Single radio AP's
SSID (service set identifier)
Acknowledgement frames
44. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Brute force - statistical and dictionary
Interoperability testing organization
Active mode
3
45. Layer 2 Tunneling Protocol commonly uses which encryption method?
ISM
IPSec
Open system
Dynamic Rate switching
46. WiMAX 802.16 authentication is based on...
Degradation
Know the SSID and enter it manually
32
X.509 certificates on the subscriber side only.
47. The 802.11i amendment to the standard addresses which of the following technologies?
CA - Collision avoidance
1 -6 -11
Authentication
Security
48. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
11
Number of users and software applications in use
Dual radio APs
ERP-OFDM - DSSS
49. In this mode a station can act as a relay or WLAN range extender
Access point
SSID (service set identifier)
Repeater
Unencrypted
50. The security amendment to the IEEE 802.11 standard requires ____
Diffraction
CA - Collision avoidance
2304 bytes
CCMP