SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The open system authentication process uses how many frames?
2.4-2.5GHz
TKIP - optional RC4
Two
Repeater
2. 802.11b is capable of which data rates?
UNII
Obstacles
802.11n
1 - 5.5 and 11 Mbps
3. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Plaintext
One or more
Active scanning
802.11g
4. WI-Fi Protected Setup was designed for which of the following wireless applications?
Small Office/Home Office Organizations (SOHO)
22MHz wide
Restricts access to authorized users
Interoperability testing organization
5. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Secure Layer 3 transmissions over a public network infrastructure
11
CA - Collision avoidance
Dynamic Rate switching
6. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
Refraction
802.11a
Wireless gateways
7. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
2.4-2.5GHz
AES = CCMP required
ARP spoofing
8. 802.11a uses which spread spectrum technology?
Dictionary
OFDM
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Deauth
9. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
ERP-OFDM - DSSS
22MHz wide
A VPN to the office network
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
10. The radio card can operate in one of up to six possible modes of operation...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11n
Three
WEP
11. High Throughput mode 0
Ad-Hoc
Captive portal
Greenfield mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
12. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
CCMP
Managed
802.11
13. In repeater mode - the repeater device connects to a normal '___ mode'
Acknowledgement frames
Root mode
LTE
32
14. In this mode a station can act as a relay or WLAN range extender
Unicast
Repeater
Amplitude and phase
Enter a username and password that will be central administered
15. Maximum length of data (Frame body) is 2304 when ____ is not in use
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Encryption
PIN
Authenticate - associate
16. In order to set up an ad hoc network a user must know which two parameters?
Wi-Fi Alliance
Wireless gateways
SSID and Channel
Open system and Shared key
17. Two authentication types defined in the 802.11 standard
Dual radio APs
Open system and Shared key
Dynamic Rate switching
Roaming
18. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Wireless gateways
Fake auth
Restricts access to authorized users
WPA/WPA2
19. Give two examples of WGB devices.
Greenfield mode
Wireless Game adapters and Media Bridges
Security
Plaintext
20. 802.11w can only be used in networks using_____
ARP spoofing
LTE
Two
WPA/WPA2
21. This type of authentication is essentially 'Null authentication'
7
Station (STA)
Transmitter and receiver
Open system
22. What type of algorithm does WPA use
Captive portal
TKIP - optional RC4
Authentication
1 - 5.5 and 11 Mbps
23. This is the default mode that sets the card as a client that could then connect to an AP
Three
Managed
802.11g
Mesh network
24. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
AP radio
Plaintext
Security
25. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Other 802.11a devices
6 -12 - and 24 Mbps
802.11n
Mesh network
26. The capacity of an access point is dependent upon which factors?
1
Semi directional and Highly directional
Number of users and software applications in use
Data rate increases
27. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
FHSS
LTE
Repeater
Residential and Enterprise
28. the amplitude of an RF signal is
Wireless Game adapters and Media Bridges
Service sets
Mesh network
Height of an RF signal
29. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
WEP
Enter a username and password that will be central administered
Dictionary
30. Name two relative measures of power
Arp
3
Access point
DB and dBi
31. What organization is responsible for unlicensed frequency band regulations in the United States?
SSID (service set identifier)
Monitor
Acknowledgement frames
FCC
32. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
802.11w
Dual radio APs
Active mode
AES = CCMP required
33. 802.11 uses CSMA/...
Personal mode and Enterprise Mode
FHSS
CA - Collision avoidance
Walled Garden.
34. According to the 802.11a amendment - which data rates are mandatory?
CCMP
6 -12 - and 24 Mbps
Fake auth
Managed
35. The 802.11i amendment to the standard addresses which of the following technologies?
Small Office/Home Office Organizations (SOHO)
Management - control - data
WPA2
Security
36. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
Open system and Shared key
AP to AP
1 - 5.5 and 11 Mbps
37. Which security methods do 802.11g access points support?
WPA Enterprise -WEP -MAC filters
Unencrypted
Management
802.11w
38. As a device moves away from an access point - what is true regarding dynamic rate switching?
Authentication
Data rate increases
Watt and mW
32
39. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Captive portal
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Access point
UNII
40. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Automatically monitor the network for attacks
Quality of Service
Carefully plan a strategy using WEP and VLANs
802.11i
41. 802.11g LAN operates in what frequency range?
IPSec
Authentication
Single radio AP's
2.4-2.5GHz
42. This sets the card to participate in an independent basic service set
Arp replay
Ad-Hoc
32 character maximum and is case sensitive
Degradation
43. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Bridge mode
Mismatched SSID
802.11a
Wireless gateways
44. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
SSID (service set identifier)
802.11b
Point-to-point link
Interference from a neighboring access point RF denial-of-service (Dos) attack
45. Both ___ and ___ are wireless LAN security methods that support shared key security.
SSID and Channel
32 character maximum and is case sensitive
WPA2 -WEP
Trojan/Rogue APs - Arp spoofing - DNS spoofing
46. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
CCMP
Bridge mode
Trojan/Rogue APs
Dual radio APs
47. Which process is a VPN solution intended to provide for users connection to a network
802.11a
Bridge mode
Basic Service Set (BSS)
Secure Layer 3 transmissions over a public network infrastructure
48. Wireless gateways come in two primary forms...
64-bit - 128-bit
FCC
Passive scan
Residential and Enterprise
49. The 802.11g standard uses which two speed spectrum technologies.
Master
Repeater
ERP-OFDM - DSSS
Roaming
50. ____ is also known as the Protected management frame standard
OFDM
802.11w
Small Office/Home Office Organizations (SOHO)
SSID and Channel