SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A brute force attack is limited to breaking___ WEP keys
Interference from a neighboring access point RF denial-of-service (Dos) attack
40 bit
Master
Management
2. A weakness with MAC filtering is that it allows an intruder to ____
7
Spoof an address
802.11
Small Office/Home Office Organizations (SOHO)
3. 802.11 uses CSMA/...
FCC
Active mode
CA - Collision avoidance
Height of an RF signal
4. Which function does RBAC provide?
Restricts access to authorized users
Root mode
PIN
Enter a username and password that will be central administered
5. Collisions are detected through the use of....
Greenfield mode
Acknowledgement frames
Three
Access point
6. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Authenticate - associate
MAC
Access point
Enter a username and password that will be central administered
7. This is a topology in which two or more APs are connected by a common distribution system.
AP radio
AES = CCMP required
Extended Service Set (ESS)
Unicast
8. Aireplay-ng -0
Degradation
Unencrypted
Quality of Service
Deauth
9. Which items are unique to a service set identifier
Independent
Three
32 character maximum and is case sensitive
25 MHz
10. An Ack is expected for every____ frame transmitted
Arp
Unencrypted
Semi directional and Highly directional
Unicast
11. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
802.11r
25 MHz
4 channels
Basic Service Set (BSS)
12. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Watt and mW
Enter a username and password that will be central administered
ARP spoofing
802.11n
13. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Mesh
Extended Service Set (ESS)
Refraction
14. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Interference from a neighboring access point RF denial-of-service (Dos) attack
WPA 2.0 personal and WPS
4 channels
Master
15. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
Secure Layer 3 transmissions over a public network infrastructure
X.509 certificates on the subscriber side only.
Small Office/Home Office Organizations (SOHO)
16. the amplitude of an RF signal is
Height of an RF signal
FHSS
Refraction
Reflection
17. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
SSID (service set identifier)
Authentication
Brute force - statistical and dictionary
18. High throughput mode 2
HT 20 MHz protection mode
Single radio AP's
Reflection
Brute force - statistical and dictionary
19. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Watt and mW
Refraction
RTS/CTS
Brute force - statistical and dictionary
20. This is typically the 48-bit MAC address of the access point's radio card.
802.11b HR/DSSS and 802.11 DSSS
BSSID (Basic Service Set identifier)
Other 802.11a devices
A VPN to the office network
21. This sets the card to participate in an independent basic service set
Authenticate - associate
Ad-Hoc
Spoof an address
Client
22. Name two absolute measures of RF power
802.11i
Watt and mW
Know the SSID and enter it manually
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
23. What organization is responsible for unlicensed frequency band regulations in the United States?
ERP-OFDM - DSSS
FCC
WPA/WPA2
802.11g
24. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Dual radio APs
Reflection
Antenna diversity
HT 20 MHz protection mode
25. Aireplay-ng -3
Interference from a neighboring access point RF denial-of-service (Dos) attack
Number of users and software applications in use
Arp
Authentication
26. Maximum length of data (Frame body) is 2304 when ____ is not in use
Passve Scanning
802.11b HR/DSSS and 802.11 DSSS
Encryption
Fakeauth
27. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
Three
Carefully plan a strategy using WEP and VLANs
Single radio AP's
28. ___ are used to describe the basic components and topology of a WLAN
Wavelength
Service sets
Wireless gateways
Authenticate - associate
29. 4 types of Denial of Service attacks
WPA 2.0 personal and WPS
WEP
AP radio
CTS attacks - Deauth attack - Association flood - Jamming
30. an 802.11b 2.4GHz channel is how wide in MHz?
RC4
Repeater
22MHz wide
Authentication
31. 802.11b is capable of which data rates?
Access point
1 - 5.5 and 11 Mbps
802.11i
Addresses wireless Quality of Service
32. What best describes the Wi-Fi alliance?
1 -6 -11
Interoperability testing organization
SSID and Channel
SOHO brands that support WPS
33. The security amendment to the IEEE 802.11 standard requires ____
Authenticate - associate
40 bit
WPA 2.0 personal and WPS
CCMP
34. 802.11a uses which spread spectrum technology?
SOHO brands that support WPS
Passive scan
3
OFDM
35. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
802.11b HR/DSSS and 802.11 DSSS
Secure Layer 3 transmissions over a public network infrastructure
WPA 2.0 personal and WPS
Extended Service Set (ESS)
36. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
PIN
Wireless Game adapters and Media Bridges
Station (STA)
37. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11w
25 MHz
802.11
32 character maximum and is case sensitive
38. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Fakeauth
802.11
Degradation
Access point
39. The capacity of an access point is dependent upon which factors?
CA - Collision avoidance
Number of users and software applications in use
WEP
CTS attacks - Deauth attack - Association flood - Jamming
40. What is the gain of an antenna measured in
Basic Service Set (BSS)
DBi
Diffraction
Watt and mW
41. Which data encryption.authentication method is identified in the IEEE 802.11 standard
WEP
Passve Scanning
25 MHz
2.4-2.5GHz
42. What type of certification came from 802.11i
WPA2
Root mode
Active mode
Fake auth
43. The Access point can operate in a variety of modes...
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Data rate increases
Open system and Shared key
Fakeauth
44. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Station (STA)
HT Non member protection mode
WPA/WPA2
45. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Refraction
Managed
Small Office/Home Office Organizations (SOHO)
Enter a username and password that will be central administered
46. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Wireless Game adapters and Media Bridges
Quality of Service
802.11a
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
47. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Mesh network
Captive portal
Independent
Service sets
48. Three types of passive WEP attacks
WPA/WPA2
Brute force - statistical and dictionary
Management
Roaming
49. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Diffraction
HT Non member protection mode
802.11r
Mismatched SSID
50. A pre-shared key mode may be vulnerable to a ____ attack
Other 802.11a devices
Two
1 -6 -11
Dictionary