SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Roaming
TKIP - optional RC4
ERP-OFDM - DSSS
Interference from a neighboring access point RF denial-of-service (Dos) attack
2. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
2304 bytes
Amplitude and phase
WPA2 -WEP
Captive portal
3. Collisions are detected through the use of....
Access point
Reflection
Acknowledgement frames
802.11a
4. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Enter a username and password that will be central administered
Arp replay
Wavelength
BSSID (Basic Service Set identifier)
5. A service set identifier (SSID) has a maximum limit of how many characters?
22MHz wide
DBi
3
32
6. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Wireless gateways
FHSS
Dictionary
3
7. Name 3 channels considered non overlapping in the 2.4GHZ band
802.11n
6 -12 - and 24 Mbps
1 -6 -11
7
8. What organization is responsible for unlicensed frequency band regulations in the United States?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Root mode
FCC
Trojan/Rogue APs - Arp spoofing - DNS spoofing
9. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
One or more
HT fixed mode
Station (STA)
Personal mode and Enterprise Mode
10. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Repeater
Wi-Fi Alliance
Client
Station (STA)
11. Bridge mode will not allow client associations and is ______ only
AP to AP
Brute force - statistical and dictionary
Access point
Wireless gateways
12. As a device moves away from an access point - what is true regarding dynamic rate switching?
Transmitter and receiver
Data rate increases
WPA2
Greenfield mode
13. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
OFDM
Active mode
ISM
14. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Mesh
802.11g
15. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Unicast
Interoperability testing organization
Interference from a neighboring access point RF denial-of-service (Dos) attack
Access point
16. The open system authentication process uses how many frames?
Two
Deauth
Root mode
CTS attacks - Deauth attack - Association flood - Jamming
17. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
18. In this mode a station can act as a relay or WLAN range extender
WPA2
WPA2 -WEP
Repeater
Three
19. 802.11g LAN operates in what frequency range?
Transmitter and receiver
FHSS
0
2.4-2.5GHz
20. The association process happens after which phase?
Enter a username and password that will be central administered
Authentication
Dynamic Rate switching
IPSec
21. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
Trojan/Rogue APs - Arp spoofing - DNS spoofing
DB and dBi
Carefully plan a strategy using WEP and VLANs
22. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
Amplitude and phase
Client
Personal mode and Enterprise Mode
23. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
AP radio
Interoperability testing organization
UNII
802.11n
24. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
AES = CCMP required
Authentication
Height of an RF signal
25. Which function does RBAC provide?
Unencrypted
Restricts access to authorized users
Reflection
Carefully plan a strategy using WEP and VLANs
26. Two characteristics of signals are
MAC
Arp
Captive portal
Amplitude and phase
27. Typically a point-to-multipoint link consists of ____ connections
Three
Interoperability testing organization
WPA2 -WEP
One or more
28. This is a topology in which two or more APs are connected by a common distribution system.
DBi
Extended Service Set (ESS)
Semi directional and Highly directional
BSSID (Basic Service Set identifier)
29. High Throughput mode 1
Independent
HT Non member protection mode
Addresses wireless Quality of Service
Basic Service Set (BSS)
30. The Access point can operate in a variety of modes...
CA - Collision avoidance
802.11b HR/DSSS and 802.11 DSSS
Know the SSID and enter it manually
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
31. High Throughput mode 0
Open system
Acknowledgement frames
Secure Layer 3 transmissions over a public network infrastructure
Greenfield mode
32. The Layer 2 frame will be...
ERP-OFDM - DSSS
Unencrypted
32
LTE
33. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Secure Layer 3 transmissions over a public network infrastructure
Walled Garden.
34. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
32 character maximum and is case sensitive
Indoor and outdoor
Independent
A VPN to the office network
35. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
11
802.11b HR/DSSS and 802.11 DSSS
Diffraction
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
36. An Ack is expected for every____ frame transmitted
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Number of users and software applications in use
Unicast
Passive scan
37. ____ is also known as the Protected management frame standard
802.11w
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Passphrase
ISM
38. Aireplay-ng -3
802.11n
Ad-Hoc
Trojan/Rogue APs
Arp
39. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Secure Layer 3 transmissions over a public network infrastructure
Mesh network
DBi
6 -12 - and 24 Mbps
40. Which items are unique to a service set identifier
32 character maximum and is case sensitive
SSID and Channel
Refraction
CCMP
41. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Active mode
Data rate increases
Wavelength
Dual radio APs
42. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
WPA2
ISM
802.11b HR/DSSS and 802.11 DSSS
14
43. What algorithm does WEP use
Refraction
Repeater
0
RC4
44. Which data encryption.authentication method is identified in the IEEE 802.11 standard
HT fixed mode
WEP
TKIP - optional RC4
Residential and Enterprise
45. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Encryption
Access point
Number of users and software applications in use
Residential and Enterprise
46. Aireplay-ng -0
Mismatched SSID
FCC
Deauth
Diffraction
47. An independent basic service set (IBSS) consists of how many access points?
WPA Enterprise -WEP -MAC filters
Master
0
802.11
48. The security amendment to the IEEE 802.11 standard requires ____
802.11b
Degradation
Point-to-point link
CCMP
49. The length of a WEP key is typically ___ or ___
CTS attacks - Deauth attack - Association flood - Jamming
Wireless gateways
6 -12 - and 24 Mbps
64-bit - 128-bit
50. Two authentication types defined in the 802.11 standard
Open system and Shared key
IPSec
Other 802.11a devices
Passphrase