SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Name two relative measures of power
64-bit - 128-bit
Passphrase
DB and dBi
Interoperability testing organization
2. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Dual radio APs
Quality of Service
AES = CCMP required
FCC
3. The radio card can operate in one of up to six possible modes of operation...
Watt and mW
TKIP - optional RC4
SSID and Channel
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
4. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
PIN
WPA 2.0 personal and WPS
Security
5. Aireplay-ng -0
40 bit
ARP spoofing
Deauth
IPSec
6. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
Open system and Shared key
UNII
11
7. A brute force attack is limited to breaking___ WEP keys
14
Reflection
40 bit
Other 802.11a devices
8. an 802.11b 2.4GHz channel is how wide in MHz?
HT fixed mode
1 -6 -11
Client
22MHz wide
9. An Ack is expected for every____ frame transmitted
Unicast
Wireless gateways
22MHz wide
Active scanning
10. Which if the following organizations is responsible for standards compliance?
802.11b
Wireless gateways
Refraction
Wi-Fi Alliance
11. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
HT fixed mode
Refraction
Enter a username and password that will be central administered
12. High throughput mode 2
HT 20 MHz protection mode
Passphrase
Authenticate - associate
Wavelength
13. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
Master
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Semi directional and Highly directional
14. Collisions are detected through the use of....
Fakeauth
802.11b
Client
Acknowledgement frames
15. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Authentication
Service sets
40 bit
16. Which security methods do 802.11g access points support?
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
WPA Enterprise -WEP -MAC filters
Obstacles
802.11i
17. WiMAX 802.16 authentication is based on...
22MHz wide
1 -6 -11
Station (STA)
X.509 certificates on the subscriber side only.
18. 3 types of antennas
HT Non member protection mode
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
X.509 certificates on the subscriber side only.
Single radio AP's
19. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Root mode
CA - Collision avoidance
Watt and mW
20. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
Antenna diversity
802.11
AES = CCMP required
21. Aireplay-ng -1
CCMP
Fakeauth
7
SOHO brands that support WPS
22. 802.11a uses which spread spectrum technology?
Secure Layer 3 transmissions over a public network infrastructure
Mesh
Three
OFDM
23. The Layer 2 frame will be...
HT Non member protection mode
22MHz wide
Unencrypted
Workgroup Bridge mode.
24. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
UNII
HT Non member protection mode
Degradation
Personal mode and Enterprise Mode
25. Two authentication types defined in the 802.11 standard
Single radio AP's
Height of an RF signal
Open system and Shared key
Frequency
26. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Amplitude and phase
Monitor
Number of users and software applications in use
Quality of Service
27. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Client
FHSS
Mesh network
802.11g
28. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
Service sets
Other 802.11a devices
Beacons - Probe request - Probe response - Association Request - Reassociation Request
29. Point to Point links typically use which antenna types?
Workgroup Bridge mode.
Semi directional and Highly directional
AP radio
Master
30. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Automatically monitor the network for attacks
BSSID (Basic Service Set identifier)
Walled Garden.
3
31. These are user configurable and present in only five 802.11 frame types...
Interoperability testing organization
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Active scanning
Antenna diversity
32. What is the gain of an antenna measured in
Extended Service Set (ESS)
SSID and Channel
Monitor
DBi
33. The 802.11g standard uses which two speed spectrum technologies.
ERP-OFDM - DSSS
Wavelength
Unicast
2304 bytes
34. Probe requests are used by clients as part of the ____ process
7
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Three
Active scanning
35. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Passve Scanning
Extended Service Set (ESS)
WPA 2.0 personal and WPS
22MHz wide
36. This type of authentication is essentially 'Null authentication'
Open system
Dictionary
1
Single radio AP's
37. What type of algorithm does WPA use
PIN
Small Office/Home Office Organizations (SOHO)
TKIP - optional RC4
Root mode
38. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
Greenfield mode
FCC
802.11
39. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
SSID (service set identifier)
Authentication
ERP protection
Active mode
40. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Addresses wireless Quality of Service
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Small Office/Home Office Organizations (SOHO)
Personal mode and Enterprise Mode
41. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Mesh
WPA 2.0 personal and WPS
Trojan/Rogue APs
ERP protection
42. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Watt and mW
Dictionary
LTE
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
43. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Security
Access point
Wireless Game adapters and Media Bridges
44. Which items are unique to a service set identifier
Dual radio APs
Acknowledgement frames
Management
32 character maximum and is case sensitive
45. High Throughput mode 0
Reflection
Greenfield mode
802.11g
Open system
46. High throughput mode 3
Encryption
AES = CCMP required
7
HT fixed mode
47. Name 3 channels considered non overlapping in the 2.4GHZ band
Wireless gateways
Carefully plan a strategy using WEP and VLANs
Reflection
1 -6 -11
48. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
CCMP
Degradation
Restricts access to authorized users
Workgroup Bridge mode.
49. ___ are used to describe the basic components and topology of a WLAN
HT 20 MHz protection mode
Mesh network
Service sets
WEP
50. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Transmitter and receiver
Fakeauth
Dual radio APs
7