SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11g LAN operates in what frequency range?
Brute force - statistical and dictionary
Mesh network
Refraction
2.4-2.5GHz
2. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
3
Quality of Service
RC4
25 MHz
3. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Automatically monitor the network for attacks
Data rate increases
SSID and Channel
Trojan/Rogue APs
4. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Master
LTE
Know the SSID and enter it manually
AP to AP
5. Management frames are sent in....
11
Management - control - data
Monitor
Plaintext
6. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Residential and Enterprise
UNII
Other 802.11a devices
4 channels
7. 802.11w can only be used in networks using_____
Data rate increases
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Fakeauth
WPA/WPA2
8. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Passve Scanning
25 MHz
AES = CCMP required
HT Non member protection mode
9. The 802.11i amendment to the standard addresses which of the following technologies?
Other 802.11a devices
25 MHz
Security
Wavelength
10. The Layer 2 frame will be...
Service sets
Brute force - statistical and dictionary
WEP
Unencrypted
11. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
BSSID (Basic Service Set identifier)
Frequency
Watt and mW
Secure Layer 3 transmissions over a public network infrastructure
12. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
1
Wireless gateways
Open system
Frequency
13. 802.11 frames have a maximum 'upper-layer' payload of...
Arp
2304 bytes
WPA Enterprise -WEP -MAC filters
Monitor
14. What item has an effect on RF line of site?
Addresses wireless Quality of Service
Frequency
Bridge mode
Obstacles
15. Two authentication types defined in the 802.11 standard
7
Open system and Shared key
Management - control - data
WPA2
16. This sets the card to participate in an independent basic service set
X.509 certificates on the subscriber side only.
25 MHz
22MHz wide
Ad-Hoc
17. A basic service set identifier (BSSID) is the MAC address of the ____
Mesh
AP radio
Two
WPA 2.0 personal and WPS
18. What kind of Algorithm does WPA2 use?
Semi directional and Highly directional
AES = CCMP required
DBi
Encryption
19. In this mode a station can act as a relay or WLAN range extender
Repeater
802.11w
Passive scan
Workgroup Bridge mode.
20. The 802.11g standard uses which two speed spectrum technologies.
Interoperability testing organization
Master
WPA2
ERP-OFDM - DSSS
21. 802.11b is capable of which data rates?
Wi-Fi Alliance
1 - 5.5 and 11 Mbps
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Mesh network
22. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Management
Dictionary
Wireless gateways
Access point
23. This type of authentication is essentially 'Null authentication'
HT Non member protection mode
Open system
Passve Scanning
Greenfield mode
24. Which if the following organizations is responsible for standards compliance?
Open system and Shared key
Fake auth
802.11r
Wi-Fi Alliance
25. In bluetooth - one master may communicate with up to ___ slaves in a piconet
UNII
Interference from a neighboring access point RF denial-of-service (Dos) attack
7
HT 20 MHz protection mode
26. A brute force attack is limited to breaking___ WEP keys
Open system
Unencrypted
40 bit
Wavelength
27. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
PIN
Number of users and software applications in use
Mismatched SSID
Obstacles
28. Aireplay-ng -1
Single radio AP's
CA - Collision avoidance
Fakeauth
LTE
29. When a wireless LAN device listens for beacon frames - it is participating in which phase?
64-bit - 128-bit
Passve Scanning
Enter a username and password that will be central administered
Ad-Hoc
30. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
Know the SSID and enter it manually
WPA2
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
31. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
802.11g
ERP-OFDM - DSSS
ERP protection
Know the SSID and enter it manually
32. WiMAX 802.16 authentication is based on...
WPA/WPA2
40 bit
Captive portal
X.509 certificates on the subscriber side only.
33. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
22MHz wide
Wi-Fi Alliance
ISM
Transmitter and receiver
34. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Arp
Degradation
Restricts access to authorized users
32
35. Three types of MITM attacks
Height of an RF signal
Frequency
Wi-Fi Alliance
Trojan/Rogue APs - Arp spoofing - DNS spoofing
36. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Captive portal
Personal mode and Enterprise Mode
Brute force - statistical and dictionary
Dynamic Rate switching
37. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
CTS attacks - Deauth attack - Association flood - Jamming
14
Height of an RF signal
Extended Service Set (ESS)
38. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
X.509 certificates on the subscriber side only.
ERP-OFDM - DSSS
11
HT 20 MHz protection mode
39. What is regarded in 802.11e?
Addresses wireless Quality of Service
Enter a username and password that will be central administered
Semi directional and Highly directional
Client
40. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Secure Layer 3 transmissions over a public network infrastructure
Spoof an address
Roaming
Arp replay
41. Name 3 channels considered non overlapping in the 2.4GHZ band
AP radio
Carefully plan a strategy using WEP and VLANs
25 MHz
1 -6 -11
42. An Ack is expected for every____ frame transmitted
Unicast
WPA 2.0 personal and WPS
3
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
43. In repeater mode - the repeater device connects to a normal '___ mode'
Passphrase
1 -6 -11
22MHz wide
Root mode
44. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Arp
Walled Garden.
Repeater
Passphrase
45. High Throughput mode 0
802.11
11
Management
Greenfield mode
46. When RF passes or bends around an obstacle such as a building or column - the behavior is
11
Management - control - data
4 channels
Diffraction
47. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Workgroup Bridge mode.
Wavelength
25 MHz
802.11b
48. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Mesh network
Trojan/Rogue APs - Arp spoofing - DNS spoofing
SSID (service set identifier)
TKIP - optional RC4
49. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
RTS/CTS
Quality of Service
WEP
50. ____ is also known as the Protected management frame standard
802.11w
3
Wireless gateways
Diffraction