SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wireless gateways come in two primary forms...
Residential and Enterprise
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
One or more
2304 bytes
2. High Throughput mode 0
Greenfield mode
Acknowledgement frames
ARP spoofing
1 - 5.5 and 11 Mbps
3. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Reflection
Wavelength
Refraction
WPA/WPA2
4. High throughput mode 3
TKIP - optional RC4
OFDM
HT fixed mode
Wireless Game adapters and Media Bridges
5. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
40 bit
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Managed
Bridge mode
6. WPA was developed as an interim solution for which amendment to the 802.11 standards?
PIN
Basic Service Set (BSS)
802.11i
Mismatched SSID
7. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Personal mode and Enterprise Mode
1 -6 -11
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
8. As a device moves away from an access point - what is true regarding dynamic rate switching?
WPA/WPA2
Data rate increases
2304 bytes
Management
9. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Open system and Shared key
Repeater
Antenna diversity
64-bit - 128-bit
10. High Throughput mode 1
HT Non member protection mode
7
Three
Managed
11. Bluetooth uses a radio technology called
FHSS
802.11b HR/DSSS and 802.11 DSSS
802.11n
X.509 certificates on the subscriber side only.
12. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
HT 20 MHz protection mode
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Fake auth
SSID and Channel
13. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
BSSID (Basic Service Set identifier)
Access point
Diffraction
802.11
14. What best describes the Wi-Fi alliance?
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Deauth
Arp
Interoperability testing organization
15. A pre-shared key mode may be vulnerable to a ____ attack
Enter a username and password that will be central administered
Passive scan
Dictionary
ERP protection
16. 3 types of frames
Workgroup Bridge mode.
Data rate increases
Passve Scanning
Management - control - data
17. Three types of passive WEP attacks
Trojan/Rogue APs
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Roaming
Brute force - statistical and dictionary
18. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
MAC
802.11g
Root mode
4 channels
19. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
14
AES = CCMP required
A VPN to the office network
Semi directional and Highly directional
20. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
802.11b
ERP protection
Restricts access to authorized users
Master
21. An independent basic service set (IBSS) consists of how many access points?
CA - Collision avoidance
22MHz wide
Master
0
22. Two characteristics of signals are
DBi
Antenna diversity
Amplitude and phase
ISM
23. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
802.11a
802.11b HR/DSSS and 802.11 DSSS
Repeater
24. When a wireless LAN device listens for beacon frames - it is participating in which phase?
SSID (service set identifier)
Antenna diversity
Enter a username and password that will be central administered
Passve Scanning
25. ___ are used to describe the basic components and topology of a WLAN
WPA 2.0 personal and WPS
11
Service sets
Passphrase
26. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
1 - 5.5 and 11 Mbps
11
3
Arp
27. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Number of users and software applications in use
FHSS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Height of an RF signal
28. 802.11b is capable of which data rates?
Workgroup Bridge mode.
Amplitude and phase
RC4
1 - 5.5 and 11 Mbps
29. This type of authentication is essentially 'Null authentication'
Acknowledgement frames
Arp
Open system
Semi directional and Highly directional
30. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
22MHz wide
Captive portal
Transmitter and receiver
802.11r
31. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Authenticate - associate
Basic Service Set (BSS)
HT 20 MHz protection mode
X.509 certificates on the subscriber side only.
32. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Extended Service Set (ESS)
PIN
HT fixed mode
Acknowledgement frames
33. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
BSSID (Basic Service Set identifier)
Enter a username and password that will be central administered
1 -6 -11
34. In repeater mode - the repeater device connects to a normal '___ mode'
Mismatched SSID
Active mode
Root mode
X.509 certificates on the subscriber side only.
35. Both ___ and ___ are wireless LAN security methods that support shared key security.
Fake auth
WPA2 -WEP
Station (STA)
Mismatched SSID
36. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
37. Name two absolute measures of RF power
Watt and mW
Passive scan
SSID and Channel
2.4-2.5GHz
38. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Monitor
Obstacles
Height of an RF signal
39. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
WPA Enterprise -WEP -MAC filters
HT 20 MHz protection mode
Passve Scanning
40. Which items are unique to a service set identifier
32 character maximum and is case sensitive
Management
1 - 5.5 and 11 Mbps
Number of users and software applications in use
41. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Unicast
DBi
802.11g
Know the SSID and enter it manually
42. High throughput mode 2
HT 20 MHz protection mode
Interference from a neighboring access point RF denial-of-service (Dos) attack
Wireless gateways
Bridge mode
43. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Encryption
UNII
Interference from a neighboring access point RF denial-of-service (Dos) attack
802.11a
44. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
Spoof an address
Greenfield mode
ERP protection
45. The ___ acts as a hub for the WLAN; wireless frame pass through this device
WPA/WPA2
Other 802.11a devices
WPA2 -WEP
Access point
46. Aireplay-ng -3
0
Unencrypted
Access point
Arp
47. Management frames are sent in....
Indoor and outdoor
Unencrypted
Plaintext
Three
48. What kind of Algorithm does WPA2 use?
Active scanning
AES = CCMP required
Fakeauth
BSSID (Basic Service Set identifier)
49. What two devices use RF to communicate
Transmitter and receiver
802.11b
Managed
Wireless Game adapters and Media Bridges
50. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Extended Service Set (ESS)
Obstacles
ARP spoofing
Three