SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Fake auth
Greenfield mode
Point-to-point link
2. ____ is also known as the Protected management frame standard
802.11w
Roaming
ISM
22MHz wide
3. In repeater mode - the repeater device connects to a normal '___ mode'
Independent
Root mode
Dictionary
Transmitter and receiver
4. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Open system
SSID and Channel
Security
Workgroup Bridge mode.
5. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Diffraction
Indoor and outdoor
ERP-OFDM - DSSS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
6. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Mesh
Mismatched SSID
Walled Garden.
Authenticate - associate
7. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Basic Service Set (BSS)
Active scanning
Number of users and software applications in use
Carefully plan a strategy using WEP and VLANs
8. Bridge mode will not allow client associations and is ______ only
14
ERP-OFDM - DSSS
Trojan/Rogue APs - Arp spoofing - DNS spoofing
AP to AP
9. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Beacons - Probe request - Probe response - Association Request - Reassociation Request
FHSS
ERP-OFDM - DSSS
Fake auth
10. Three types of passive WEP attacks
Passive scan
Semi directional and Highly directional
CA - Collision avoidance
Brute force - statistical and dictionary
11. A newly configured wireless intrusion prevention system will___
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Automatically monitor the network for attacks
DBi
Management
12. In this mode - the card acts as a normal access point
Master
Unencrypted
Restricts access to authorized users
AP to AP
13. This is the default mode that sets the card as a client that could then connect to an AP
Managed
32 character maximum and is case sensitive
AP to AP
AES = CCMP required
14. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Height of an RF signal
Roaming
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Interference from a neighboring access point RF denial-of-service (Dos) attack
15. High throughput mode 2
IPSec
Authenticate - associate
Number of users and software applications in use
HT 20 MHz protection mode
16. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Quality of Service
Arp replay
Reflection
ISM
17. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Client
ISM
A VPN to the office network
Frequency
18. This sets the card to participate in an independent basic service set
Open system
IPSec
Semi directional and Highly directional
Ad-Hoc
19. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
1 - 5.5 and 11 Mbps
Personal mode and Enterprise Mode
Workgroup Bridge mode.
Dual radio APs
20. A service set identifier (SSID) has a maximum limit of how many characters?
RC4
Semi directional and Highly directional
32
802.11g
21. Aireplay-ng -1
2.4-2.5GHz
25 MHz
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Fakeauth
22. Aireplay-ng -0
Deauth
802.11b HR/DSSS and 802.11 DSSS
WPA2 -WEP
OFDM
23. What is regarded in 802.11e?
3
Frequency
AP radio
Addresses wireless Quality of Service
24. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Repeater
Beacons - Probe request - Probe response - Association Request - Reassociation Request
LTE
CA - Collision avoidance
25. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Repeater
Managed
IPSec
Basic Service Set (BSS)
26. A basic service set (BSS) consists of how many access points
Open system and Shared key
CCMP
1
Unencrypted
27. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Restricts access to authorized users
Root mode
4 channels
28. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Dual radio APs
CCMP
Monitor
Three
29. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
SSID and Channel
MAC
CTS attacks - Deauth attack - Association flood - Jamming
SSID (service set identifier)
30. Two characteristics of signals are
Amplitude and phase
Encryption
25 MHz
Trojan/Rogue APs
31. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Management - control - data
802.11b
AP to AP
32. This is a topology in which two or more APs are connected by a common distribution system.
DBi
Extended Service Set (ESS)
802.11
40 bit
33. What two devices use RF to communicate
Number of users and software applications in use
4 channels
Transmitter and receiver
ERP protection
34. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
ARP spoofing
Height of an RF signal
UNII
Brute force - statistical and dictionary
35. The length of a WEP key is typically ___ or ___
ERP protection
64-bit - 128-bit
Restricts access to authorized users
Number of users and software applications in use
36. Which if the following organizations is responsible for standards compliance?
Semi directional and Highly directional
Wi-Fi Alliance
Residential and Enterprise
802.11g
37. 3 types of antennas
40 bit
Number of users and software applications in use
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Antenna diversity
38. 802.11g LAN operates in what frequency range?
Other 802.11a devices
2.4-2.5GHz
Service sets
802.11g
39. WiMAX 802.16 authentication is based on...
Semi directional and Highly directional
X.509 certificates on the subscriber side only.
Master
Other 802.11a devices
40. What is the gain of an antenna measured in
Addresses wireless Quality of Service
DBi
SOHO brands that support WPS
Passive scan
41. Aireplay-ng -3
Interoperability testing organization
Arp
Other 802.11a devices
Indoor and outdoor
42. High Throughput mode 1
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
HT Non member protection mode
Two
DBi
43. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Roaming
802.11w
Other 802.11a devices
BSSID (Basic Service Set identifier)
44. The Layer 2 frame will be...
Brute force - statistical and dictionary
ARP spoofing
Unencrypted
Height of an RF signal
45. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Mismatched SSID
Plaintext
BSSID (Basic Service Set identifier)
802.11
46. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Know the SSID and enter it manually
802.11w
UNII
Basic Service Set (BSS)
47. Three types of MITM attacks
Other 802.11a devices
CCMP
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Carefully plan a strategy using WEP and VLANs
48. A brute force attack is limited to breaking___ WEP keys
802.11w
11
Know the SSID and enter it manually
40 bit
49. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
Small Office/Home Office Organizations (SOHO)
SSID (service set identifier)
Degradation
50. Layer 2 Tunneling Protocol commonly uses which encryption method?
HT 20 MHz protection mode
Managed
IPSec
64-bit - 128-bit