SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -3
Arp
DB and dBi
40 bit
Passve Scanning
2. The 802.11g standard uses which two speed spectrum technologies.
0
Transmitter and receiver
Height of an RF signal
ERP-OFDM - DSSS
3. As a device moves away from an access point - what is true regarding dynamic rate switching?
Secure Layer 3 transmissions over a public network infrastructure
Access point
Data rate increases
802.11a
4. The association process happens after which phase?
3
Authentication
FHSS
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
5. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
802.11n
RC4
1
Monitor
6. WI-Fi Protected Setup was designed for which of the following wireless applications?
Encryption
Wi-Fi Alliance
Greenfield mode
Small Office/Home Office Organizations (SOHO)
7. Three types of MITM attacks
OFDM
64-bit - 128-bit
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Monitor
8. ___ are used to describe the basic components and topology of a WLAN
Repeater
Service sets
Fake auth
Mesh network
9. What is the gain of an antenna measured in
Wireless Game adapters and Media Bridges
Automatically monitor the network for attacks
Mismatched SSID
DBi
10. In this mode - the card acts as a normal access point
Dual radio APs
Passphrase
Master
802.11w
11. 4 types of Denial of Service attacks
Beacons - Probe request - Probe response - Association Request - Reassociation Request
AES = CCMP required
CTS attacks - Deauth attack - Association flood - Jamming
Transmitter and receiver
12. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
WPA/WPA2
FCC
FHSS
802.11b HR/DSSS and 802.11 DSSS
13. 802.11b is capable of which data rates?
Automatically monitor the network for attacks
Mesh
1 - 5.5 and 11 Mbps
1 -6 -11
14. an 802.11b 2.4GHz channel is how wide in MHz?
22MHz wide
Wi-Fi Alliance
14
FHSS
15. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
32
Carefully plan a strategy using WEP and VLANs
Quality of Service
WPA/WPA2
16. Beacons allow client devices to ____ for available LANS
BSSID (Basic Service Set identifier)
Managed
Passive scan
802.11
17. 802.11a uses which spread spectrum technology?
RTS/CTS
Basic Service Set (BSS)
OFDM
2304 bytes
18. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
2.4-2.5GHz
802.11i
Number of users and software applications in use
19. High Throughput mode 1
Active scanning
Captive portal
HT Non member protection mode
ERP-OFDM - DSSS
20. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
Enter a username and password that will be central administered
WPA/WPA2
Open system and Shared key
21. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
0
WPA2
Captive portal
Indoor and outdoor
22. An Ack is expected for every____ frame transmitted
Fake auth
3
Access point
Unicast
23. 3 types of frames
Extended Service Set (ESS)
802.11
Management - control - data
Captive portal
24. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Security
802.11a
HT fixed mode
Mismatched SSID
25. Which security feature provides the strongest security for a home-based wireless network?
802.11a
Acknowledgement frames
7
Passphrase
26. Collisions are detected through the use of....
Indoor and outdoor
Deauth
Acknowledgement frames
HT 20 MHz protection mode
27. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
HT 20 MHz protection mode
Enter a username and password that will be central administered
802.11i
Trojan/Rogue APs - Arp spoofing - DNS spoofing
28. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-Hoc
HT 20 MHz protection mode
PIN
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
29. 802.11g LAN operates in what frequency range?
Trojan/Rogue APs
Refraction
2.4-2.5GHz
Brute force - statistical and dictionary
30. What algorithm does WEP use
RC4
Ad-Hoc
Station (STA)
802.11w
31. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
FCC
WPA 2.0 personal and WPS
Trojan/Rogue APs
Small Office/Home Office Organizations (SOHO)
32. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
802.11a
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Fake auth
802.11b
33. A brute force attack is limited to breaking___ WEP keys
BSSID (Basic Service Set identifier)
Authentication
40 bit
Managed
34. In bluetooth - one master may communicate with up to ___ slaves in a piconet
X.509 certificates on the subscriber side only.
802.11
7
AES = CCMP required
35. This type of authentication is essentially 'Null authentication'
Open system
Passive scan
Indoor and outdoor
BSSID (Basic Service Set identifier)
36. The Access point can operate in a variety of modes...
Enter a username and password that will be central administered
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Diffraction
AP radio
37. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
1 - 5.5 and 11 Mbps
Interference from a neighboring access point RF denial-of-service (Dos) attack
WPA/WPA2
Service sets
38. Maximum length of data (Frame body) is 2304 when ____ is not in use
802.11b HR/DSSS and 802.11 DSSS
Encryption
802.11g
WEP
39. Bridge mode will not allow client associations and is ______ only
HT Non member protection mode
ERP protection
AP to AP
Repeater
40. The Layer 2 frame will be...
Deauth
Open system
Enter a username and password that will be central administered
Unencrypted
41. A station can act as a routing node in a wireless mesh network
Authentication
802.11n
Mesh
Passive scan
42. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11n
Other 802.11a devices
CA - Collision avoidance
Station (STA)
43. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Addresses wireless Quality of Service
Antenna diversity
FHSS
Client
44. What organization is responsible for unlicensed frequency band regulations in the United States?
Deauth
FHSS
FCC
Brute force - statistical and dictionary
45. High Throughput mode 0
SSID and Channel
Automatically monitor the network for attacks
Personal mode and Enterprise Mode
Greenfield mode
46. Point to Point links typically use which antenna types?
Semi directional and Highly directional
Trojan/Rogue APs
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Acknowledgement frames
47. This sets the card to participate in an independent basic service set
Ad-Hoc
40 bit
Obstacles
802.11b HR/DSSS and 802.11 DSSS
48. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Restricts access to authorized users
ISM
Arp replay
Quality of Service
49. Which function does RBAC provide?
CCMP
Restricts access to authorized users
IPSec
PIN
50. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
2304 bytes
7
Enter a username and password that will be central administered