Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A brute force attack is limited to breaking___ WEP keys






2. A weakness with MAC filtering is that it allows an intruder to ____






3. 802.11 uses CSMA/...






4. Which function does RBAC provide?






5. Collisions are detected through the use of....






6. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






7. This is a topology in which two or more APs are connected by a common distribution system.






8. Aireplay-ng -0






9. Which items are unique to a service set identifier






10. An Ack is expected for every____ frame transmitted






11. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






12. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






13. WPA was developed as an interim solution for which amendment to the 802.11 standards?






14. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






15. A basic service set identifier (BSSID) is the MAC address of the ____






16. the amplitude of an RF signal is






17. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






18. High throughput mode 2






19. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






20. This is typically the 48-bit MAC address of the access point's radio card.






21. This sets the card to participate in an independent basic service set






22. Name two absolute measures of RF power






23. What organization is responsible for unlicensed frequency band regulations in the United States?






24. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






25. Aireplay-ng -3






26. Maximum length of data (Frame body) is 2304 when ____ is not in use






27. In repeater mode - the repeater device connects to a normal '___ mode'






28. ___ are used to describe the basic components and topology of a WLAN






29. 4 types of Denial of Service attacks






30. an 802.11b 2.4GHz channel is how wide in MHz?






31. 802.11b is capable of which data rates?






32. What best describes the Wi-Fi alliance?






33. The security amendment to the IEEE 802.11 standard requires ____






34. 802.11a uses which spread spectrum technology?






35. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






36. Layer 2 Tunneling Protocol commonly uses which encryption method?






37. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






38. The ___ acts as a hub for the WLAN; wireless frame pass through this device






39. The capacity of an access point is dependent upon which factors?






40. What is the gain of an antenna measured in






41. Which data encryption.authentication method is identified in the IEEE 802.11 standard






42. What type of certification came from 802.11i






43. The Access point can operate in a variety of modes...






44. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






45. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...






46. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






47. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






48. Three types of passive WEP attacks






49. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






50. A pre-shared key mode may be vulnerable to a ____ attack