SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A brute force attack is limited to breaking___ WEP keys
Access point
40 bit
Bridge mode
Greenfield mode
2. Which items are unique to a service set identifier
32 character maximum and is case sensitive
Small Office/Home Office Organizations (SOHO)
1 -6 -11
Antenna diversity
3. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Client
802.11i
A VPN to the office network
802.11a
4. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
A VPN to the office network
WEP
Degradation
WPA Enterprise -WEP -MAC filters
5. Maximum length of data (Frame body) is 2304 when ____ is not in use
Obstacles
Dynamic Rate switching
Passphrase
Encryption
6. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
One or more
WPA 2.0 personal and WPS
MAC
7. Management frames are sent in....
TKIP - optional RC4
Security
Plaintext
Management - control - data
8. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
PIN
3
Ad-Hoc
9. As a device moves away from an access point - what is true regarding dynamic rate switching?
Authentication
Know the SSID and enter it manually
Access point
Data rate increases
10. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Diffraction
Unencrypted
Other 802.11a devices
ISM
11. Point to Point links typically use which antenna types?
CTS attacks - Deauth attack - Association flood - Jamming
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
6 -12 - and 24 Mbps
Semi directional and Highly directional
12. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Station (STA)
Reflection
Small Office/Home Office Organizations (SOHO)
13. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Carefully plan a strategy using WEP and VLANs
BSSID (Basic Service Set identifier)
Transmitter and receiver
Active mode
14. The Layer 2 frame will be...
CA - Collision avoidance
802.11b
0
Unencrypted
15. An independent basic service set (IBSS) consists of how many access points?
0
Authentication
Arp replay
WPA 2.0 personal and WPS
16. A service set identifier (SSID) has a maximum limit of how many characters?
One or more
Walled Garden.
32
Open system
17. What is regarded in 802.11e?
Addresses wireless Quality of Service
SOHO brands that support WPS
Service sets
40 bit
18. A basic service set identifier (BSSID) is the MAC address of the ____
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
14
Wi-Fi Alliance
AP radio
19. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Point-to-point link
Ad-Hoc
Encryption
802.11i
20. Typically a point-to-multipoint link consists of ____ connections
6 -12 - and 24 Mbps
Arp
Three
Greenfield mode
21. 802.11 frames have a maximum 'upper-layer' payload of...
Ad-Hoc
Fakeauth
Obstacles
2304 bytes
22. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
802.11a
1 -6 -11
Station (STA)
23. When an RF signal bounces off a smooth non absorptive surface - the behavior is
MAC
Reflection
Carefully plan a strategy using WEP and VLANs
Indoor and outdoor
24. Name 3 channels considered non overlapping in the 2.4GHZ band
Spoof an address
1 -6 -11
One or more
Arp
25. The 802.11g standard uses which two speed spectrum technologies.
ERP-OFDM - DSSS
Semi directional and Highly directional
1 - 5.5 and 11 Mbps
AES = CCMP required
26. 3 types of frames
Access point
40 bit
Management - control - data
6 -12 - and 24 Mbps
27. What algorithm does WEP use
Spoof an address
AES = CCMP required
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
RC4
28. The Access point can operate in a variety of modes...
Open system
Obstacles
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
MAC
29. This type of authentication is essentially 'Null authentication'
Wireless Game adapters and Media Bridges
Open system
Open system and Shared key
X.509 certificates on the subscriber side only.
30. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
WPA/WPA2
Station (STA)
CCMP
Trojan/Rogue APs
31. WI-Fi Protected Setup was designed for which of the following wireless applications?
Plaintext
Small Office/Home Office Organizations (SOHO)
1 - 5.5 and 11 Mbps
802.11w
32. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
DB and dBi
HT Non member protection mode
Personal mode and Enterprise Mode
33. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
32
3
UNII
34. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
DBi
Passve Scanning
SSID and Channel
Personal mode and Enterprise Mode
35. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
Dynamic Rate switching
CTS attacks - Deauth attack - Association flood - Jamming
ERP protection
36. Which data encryption.authentication method is identified in the IEEE 802.11 standard
One or more
Automatically monitor the network for attacks
WEP
Restricts access to authorized users
37. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
11
HT fixed mode
Know the SSID and enter it manually
Trojan/Rogue APs - Arp spoofing - DNS spoofing
38. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Interoperability testing organization
802.11g
MAC
Unicast
39. Layer 2 Tunneling Protocol commonly uses which encryption method?
802.11b HR/DSSS and 802.11 DSSS
Authentication
Secure Layer 3 transmissions over a public network infrastructure
IPSec
40. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Passive scan
Arp
MAC
14
41. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
SOHO brands that support WPS
Quality of Service
Encryption
Three
42. A basic service set (BSS) consists of how many access points
Automatically monitor the network for attacks
Personal mode and Enterprise Mode
1
Master
43. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Mismatched SSID
ERP-OFDM - DSSS
Fake auth
Passphrase
44. 3 types of antennas
Wireless Game adapters and Media Bridges
Repeater
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
2.4-2.5GHz
45. The capacity of an access point is dependent upon which factors?
Active scanning
DB and dBi
2.4-2.5GHz
Number of users and software applications in use
46. The security amendment to the IEEE 802.11 standard requires ____
DBi
Brute force - statistical and dictionary
CCMP
Authentication
47. Three types of passive WEP attacks
Quality of Service
Acknowledgement frames
Mismatched SSID
Brute force - statistical and dictionary
48. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
1 -6 -11
SSID (service set identifier)
Acknowledgement frames
Master
49. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Dictionary
PIN
Root mode
Interference from a neighboring access point RF denial-of-service (Dos) attack
50. A ______________ does not always use an omnidirectional antenna
Point-to-point link
ERP protection
Semi directional and Highly directional
Unencrypted