SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Active mode
Mismatched SSID
MAC
2. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
WPA/WPA2
Dictionary
Personal mode and Enterprise Mode
CCMP
4. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Repeater
Point-to-point link
UNII
Wireless gateways
5. Point to Point links typically use which antenna types?
Semi directional and Highly directional
DBi
Plaintext
Wi-Fi Alliance
6. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b
ERP protection
802.11b HR/DSSS and 802.11 DSSS
802.11w
7. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
IPSec
AP radio
40 bit
8. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Access point
Automatically monitor the network for attacks
802.11g
Workgroup Bridge mode.
9. This type of authentication is essentially 'Null authentication'
Open system
FCC
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Indoor and outdoor
10. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Fake auth
PIN
Transmitter and receiver
HT fixed mode
11. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
40 bit
Passive scan
MAC
12. Collisions are detected through the use of....
Three
Acknowledgement frames
Fakeauth
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
13. WiMAX 802.16 authentication is based on...
PIN
ARP spoofing
Passive scan
X.509 certificates on the subscriber side only.
14. the amplitude of an RF signal is
OFDM
Automatically monitor the network for attacks
Height of an RF signal
Trojan/Rogue APs - Arp spoofing - DNS spoofing
15. Which security methods do 802.11g access points support?
DBi
Degradation
WPA Enterprise -WEP -MAC filters
Wireless Game adapters and Media Bridges
16. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
LTE
CCMP
Wavelength
RC4
17. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Height of an RF signal
WEP
LTE
3
18. High throughput mode 3
UNII
14
HT fixed mode
Wireless Game adapters and Media Bridges
19. Two authentication types defined in the 802.11 standard
Open system and Shared key
Degradation
DB and dBi
1 - 5.5 and 11 Mbps
20. Beacons allow client devices to ____ for available LANS
Passive scan
RTS/CTS
6 -12 - and 24 Mbps
UNII
21. Both ___ and ___ are wireless LAN security methods that support shared key security.
CA - Collision avoidance
WPA2 -WEP
AP radio
802.11n
22. Wireless gateways come in two primary forms...
Management
Residential and Enterprise
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Encryption
23. High throughput mode 2
Passphrase
802.11n
HT 20 MHz protection mode
Enter a username and password that will be central administered
24. What is regarded in 802.11e?
Extended Service Set (ESS)
Addresses wireless Quality of Service
Dictionary
Mismatched SSID
25. Bluetooth uses a radio technology called
FHSS
Reflection
Trojan/Rogue APs
Mesh
26. 802.11 frames have a maximum 'upper-layer' payload of...
Two
2304 bytes
Access point
Fakeauth
27. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
0
Interoperability testing organization
UNII
A VPN to the office network
28. Aireplay-ng -0
Deauth
Root mode
AP to AP
14
29. A basic service set identifier (BSSID) is the MAC address of the ____
Authenticate - associate
AP radio
Addresses wireless Quality of Service
Diffraction
30. What is the gain of an antenna measured in
Fake auth
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Single radio AP's
DBi
31. The length of a WEP key is typically ___ or ___
Beacons - Probe request - Probe response - Association Request - Reassociation Request
64-bit - 128-bit
1 -6 -11
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
32. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Mesh network
Acknowledgement frames
MAC
One or more
33. This is a topology in which two or more APs are connected by a common distribution system.
Number of users and software applications in use
Restricts access to authorized users
Bridge mode
Extended Service Set (ESS)
34. A service set identifier (SSID) has a maximum limit of how many characters?
DBi
Carefully plan a strategy using WEP and VLANs
32
Management
35. In repeater mode - the repeater device connects to a normal '___ mode'
Access point
0
22MHz wide
Root mode
36. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Encryption
SSID and Channel
6 -12 - and 24 Mbps
SSID (service set identifier)
37. Typically a point-to-multipoint link consists of ____ connections
Reflection
WPA Enterprise -WEP -MAC filters
Residential and Enterprise
Three
38. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
AES = CCMP required
BSSID (Basic Service Set identifier)
Indoor and outdoor
39. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Passive scan
Trojan/Rogue APs
WPA Enterprise -WEP -MAC filters
AES = CCMP required
40. The radio card can operate in one of up to six possible modes of operation...
RTS/CTS
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Trojan/Rogue APs
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
41. A basic service set (BSS) consists of how many access points
Reflection
14
1
Ad-Hoc
42. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
802.11i
Carefully plan a strategy using WEP and VLANs
Interference from a neighboring access point RF denial-of-service (Dos) attack
43. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Greenfield mode
Frequency
RTS/CTS
44. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
0
Passphrase
Unicast
LTE
45. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Addresses wireless Quality of Service
RC4
Data rate increases
Active mode
46. In this mode a station can act as a relay or WLAN range extender
Wireless Game adapters and Media Bridges
4 channels
802.11r
Repeater
47. Which security feature provides the strongest security for a home-based wireless network?
SSID and Channel
Passphrase
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Management
48. This is the default mode that sets the card as a client that could then connect to an AP
Managed
Wireless gateways
Repeater
SSID (service set identifier)
49. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
40 bit
11
Captive portal
50. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
CA - Collision avoidance
RTS/CTS
WPA2