SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Open system and Shared key
Mesh network
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
0
2. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
802.11i
SSID and Channel
Fakeauth
3. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Ad-Hoc
802.11
Active mode
Obstacles
4. Bluetooth uses a radio technology called
Single radio AP's
FHSS
Arp
Secure Layer 3 transmissions over a public network infrastructure
5. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Secure Layer 3 transmissions over a public network infrastructure
Greenfield mode
SSID (service set identifier)
Single radio AP's
6. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Management - control - data
Trojan/Rogue APs
ISM
Deauth
7. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Unicast
802.11g
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Addresses wireless Quality of Service
8. When an RF signal bounces off a smooth non absorptive surface - the behavior is
802.11n
X.509 certificates on the subscriber side only.
DB and dBi
Reflection
9. WI-Fi Protected Setup was designed for which of the following wireless applications?
WEP
Small Office/Home Office Organizations (SOHO)
WPA2 -WEP
Wavelength
10. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
802.11
Interference from a neighboring access point RF denial-of-service (Dos) attack
11
ISM
11. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
Root mode
Ad-Hoc
802.11
12. This is the default mode that sets the card as a client that could then connect to an AP
Extended Service Set (ESS)
Root mode
Personal mode and Enterprise Mode
Managed
13. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Height of an RF signal
Semi directional and Highly directional
Authenticate - associate
14. 802.11b is capable of which data rates?
Repeater
Ad-Hoc
1 - 5.5 and 11 Mbps
Data rate increases
15. This is a topology in which two or more APs are connected by a common distribution system.
802.11w
Two
Extended Service Set (ESS)
Degradation
16. The association process happens after which phase?
2304 bytes
Spoof an address
Authentication
32
17. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
ARP spoofing
Authenticate - associate
BSSID (Basic Service Set identifier)
HT fixed mode
18. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
2304 bytes
Wavelength
SSID (service set identifier)
LTE
19. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
Ad-Hoc
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Point-to-point link
20. This type of authentication is essentially 'Null authentication'
Open system
802.11g
CCMP
Number of users and software applications in use
21. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
MAC
Mismatched SSID
Other 802.11a devices
Workgroup Bridge mode.
22. ___ are used to describe the basic components and topology of a WLAN
Reflection
Bridge mode
Service sets
1 - 5.5 and 11 Mbps
23. Give two examples of WGB devices.
Managed
Authentication
Wireless Game adapters and Media Bridges
Encryption
24. Point to Point links typically use which antenna types?
Semi directional and Highly directional
Access point
802.11g
ERP-OFDM - DSSS
25. an 802.11b 2.4GHz channel is how wide in MHz?
Point-to-point link
22MHz wide
A VPN to the office network
Passve Scanning
26. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
Repeater
Two
Restricts access to authorized users
27. This is typically the 48-bit MAC address of the access point's radio card.
RTS/CTS
BSSID (Basic Service Set identifier)
Residential and Enterprise
Small Office/Home Office Organizations (SOHO)
28. Layer 2 Tunneling Protocol commonly uses which encryption method?
1
Point-to-point link
IPSec
Passve Scanning
29. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Small Office/Home Office Organizations (SOHO)
0
Managed
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
30. The open system authentication process uses how many frames?
Station (STA)
AP radio
UNII
Two
31. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Unicast
6 -12 - and 24 Mbps
RC4
A VPN to the office network
32. The 802.11g standard uses which two speed spectrum technologies.
Obstacles
Extended Service Set (ESS)
HT Non member protection mode
ERP-OFDM - DSSS
33. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Fakeauth
Residential and Enterprise
Antenna diversity
UNII
34. What kind of Algorithm does WPA2 use?
Active scanning
DBi
AES = CCMP required
11
35. 802.11 frames have a maximum 'upper-layer' payload of...
Arp replay
Automatically monitor the network for attacks
2304 bytes
Passphrase
36. In this mode - the card acts as a normal access point
Client
Master
CA - Collision avoidance
Arp replay
37. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
32
Wavelength
Number of users and software applications in use
38. A brute force attack is limited to breaking___ WEP keys
AP radio
Ad-Hoc
40 bit
Security
39. Both ___ and ___ are wireless LAN security methods that support shared key security.
LTE
WPA Enterprise -WEP -MAC filters
WPA2 -WEP
Repeater
40. What best describes the Wi-Fi alliance?
Arp replay
Interoperability testing organization
X.509 certificates on the subscriber side only.
FCC
41. What algorithm does WEP use
Wireless Game adapters and Media Bridges
Single radio AP's
Personal mode and Enterprise Mode
RC4
42. Probe requests are used by clients as part of the ____ process
OFDM
BSSID (Basic Service Set identifier)
Residential and Enterprise
Active scanning
43. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Deauth
Dual radio APs
3
ERP protection
44. When RF passes or bends around an obstacle such as a building or column - the behavior is
SSID and Channel
Active mode
Secure Layer 3 transmissions over a public network infrastructure
Diffraction
45. What organization is responsible for unlicensed frequency band regulations in the United States?
Workgroup Bridge mode.
FCC
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Security
46. The 802.11i amendment to the standard addresses which of the following technologies?
Active scanning
A VPN to the office network
SSID and Channel
Security
47. A ______________ does not always use an omnidirectional antenna
Extended Service Set (ESS)
Spoof an address
Point-to-point link
802.11b
48. 3 types of frames
Management - control - data
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Greenfield mode
Watt and mW
49. Three types of MITM attacks
Ad-Hoc
Degradation
Trojan/Rogue APs - Arp spoofing - DNS spoofing
2.4-2.5GHz
50. the amplitude of an RF signal is
Dictionary
Management
3
Height of an RF signal