SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. an 802.11b 2.4GHz channel is how wide in MHz?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
22MHz wide
Active mode
Walled Garden.
2. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
WPA2 -WEP
802.11a
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Frequency
3. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
Authentication
802.11r
WPA Enterprise -WEP -MAC filters
4. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Diffraction
Station (STA)
1
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
5. In bluetooth - one master may communicate with up to ___ slaves in a piconet
7
802.11i
Root mode
Antenna diversity
6. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Access point
FHSS
Mismatched SSID
Carefully plan a strategy using WEP and VLANs
7. What kind of Algorithm does WPA2 use?
WPA2
Access point
AES = CCMP required
Quality of Service
8. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
Repeater
Authentication
Security
9. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Plaintext
Carefully plan a strategy using WEP and VLANs
Mesh
10. In this mode a station can act as a relay or WLAN range extender
Arp replay
Obstacles
Addresses wireless Quality of Service
Repeater
11. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Degradation
Management
Fake auth
802.11b HR/DSSS and 802.11 DSSS
12. Aireplay-ng -3
32 character maximum and is case sensitive
Addresses wireless Quality of Service
Arp
Number of users and software applications in use
13. This type of authentication is essentially 'Null authentication'
Residential and Enterprise
Enter a username and password that will be central administered
Open system
0
14. A pre-shared key mode may be vulnerable to a ____ attack
2.4-2.5GHz
1 - 5.5 and 11 Mbps
MAC
Dictionary
15. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Refraction
11
7
Restricts access to authorized users
16. When an RF signal bounces off a smooth non absorptive surface - the behavior is
WPA2 -WEP
Reflection
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Passive scan
17. An independent basic service set (IBSS) consists of how many access points?
Dictionary
Access point
AP to AP
0
18. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Refraction
ARP spoofing
Extended Service Set (ESS)
Residential and Enterprise
19. Which function does RBAC provide?
MAC
Restricts access to authorized users
Know the SSID and enter it manually
Interoperability testing organization
20. A station can act as a routing node in a wireless mesh network
802.11
Mesh
Amplitude and phase
Enter a username and password that will be central administered
21. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. High Throughput mode 1
HT Non member protection mode
Interference from a neighboring access point RF denial-of-service (Dos) attack
One or more
Other 802.11a devices
23. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Authenticate - associate
Unencrypted
Other 802.11a devices
Independent
24. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
DBi
Personal mode and Enterprise Mode
Independent
Open system and Shared key
25. 802.11 uses CSMA/...
CA - Collision avoidance
LTE
1 -6 -11
Number of users and software applications in use
26. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
Refraction
Open system
Active scanning
27. Point to Point links typically use which antenna types?
Other 802.11a devices
Semi directional and Highly directional
Wavelength
Monitor
28. The 802.11g standard uses which two speed spectrum technologies.
ERP protection
CA - Collision avoidance
ERP-OFDM - DSSS
Quality of Service
29. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
ERP-OFDM - DSSS
Indoor and outdoor
BSSID (Basic Service Set identifier)
Walled Garden.
30. In repeater mode - the repeater device connects to a normal '___ mode'
RTS/CTS
Reflection
Master
Root mode
31. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
ARP spoofing
HT 20 MHz protection mode
Deauth
A VPN to the office network
32. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
WPA Enterprise -WEP -MAC filters
HT 20 MHz protection mode
Arp replay
33. A ______________ does not always use an omnidirectional antenna
Station (STA)
CTS attacks - Deauth attack - Association flood - Jamming
Point-to-point link
25 MHz
34. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
25 MHz
Degradation
Fakeauth
Other 802.11a devices
35. What organization is responsible for unlicensed frequency band regulations in the United States?
Monitor
Authenticate - associate
FCC
32 character maximum and is case sensitive
36. What two devices use RF to communicate
BSSID (Basic Service Set identifier)
Refraction
25 MHz
Transmitter and receiver
37. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
802.11g
Residential and Enterprise
Unencrypted
38. The length of a WEP key is typically ___ or ___
Plaintext
1
802.11r
64-bit - 128-bit
39. Two authentication types defined in the 802.11 standard
Personal mode and Enterprise Mode
Open system and Shared key
Root mode
Mesh network
40. An Ack is expected for every____ frame transmitted
Passphrase
HT Non member protection mode
Unicast
Data rate increases
41. The association process happens after which phase?
Know the SSID and enter it manually
Authentication
64-bit - 128-bit
ISM
42. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
802.11a
OFDM
AP to AP
CTS attacks - Deauth attack - Association flood - Jamming
43. What is regarded in 802.11e?
Extended Service Set (ESS)
Frequency
Indoor and outdoor
Addresses wireless Quality of Service
44. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Access point
Unencrypted
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Repeater
45. Name 3 channels considered non overlapping in the 2.4GHZ band
LTE
1 -6 -11
Dynamic Rate switching
Reflection
46. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
802.11a
FHSS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
47. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
CTS attacks - Deauth attack - Association flood - Jamming
Active mode
Dual radio APs
Quality of Service
48. 802.11a uses which spread spectrum technology?
Managed
Addresses wireless Quality of Service
OFDM
HT Non member protection mode
49. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Obstacles
Station (STA)
Management - control - data
HT fixed mode
50. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
Access point
Master
Authenticate - associate