SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two authentication types defined in the 802.11 standard
One or more
Open system and Shared key
Two
HT 20 MHz protection mode
2. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
HT fixed mode
Enter a username and password that will be central administered
Fakeauth
Access point
3. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Basic Service Set (BSS)
Security
Quality of Service
Client
4. Name two relative measures of power
Station (STA)
Degradation
DB and dBi
Interference from a neighboring access point RF denial-of-service (Dos) attack
5. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
32
OFDM
0
6. When RF passes or bends around an obstacle such as a building or column - the behavior is
LTE
DBi
Fakeauth
Diffraction
7. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
1 -6 -11
Fake auth
CA - Collision avoidance
Bridge mode
8. What two devices use RF to communicate
AP to AP
Transmitter and receiver
Encryption
Data rate increases
9. What is regarded in 802.11e?
Addresses wireless Quality of Service
802.11i
Greenfield mode
Antenna diversity
10. High throughput mode 3
802.11b HR/DSSS and 802.11 DSSS
Access point
HT fixed mode
Three
11. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
2304 bytes
7
802.11r
Quality of Service
12. An independent basic service set (IBSS) consists of how many access points?
Access point
0
802.11b HR/DSSS and 802.11 DSSS
Height of an RF signal
13. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Personal mode and Enterprise Mode
7
TKIP - optional RC4
Height of an RF signal
14. 802.11b is capable of which data rates?
LTE
A VPN to the office network
Arp replay
1 - 5.5 and 11 Mbps
15. A ______________ does not always use an omnidirectional antenna
Point-to-point link
Active scanning
802.11a
Encryption
16. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Active mode
Two
WEP
CA - Collision avoidance
17. The 802.11g standard uses which two speed spectrum technologies.
Degradation
ERP-OFDM - DSSS
Obstacles
IPSec
18. Bluetooth uses a radio technology called
TKIP - optional RC4
FHSS
802.11b HR/DSSS and 802.11 DSSS
Arp replay
19. WiMAX 802.16 authentication is based on...
Know the SSID and enter it manually
X.509 certificates on the subscriber side only.
Encryption
Height of an RF signal
20. This sets the card to participate in an independent basic service set
Ad-Hoc
Arp replay
Automatically monitor the network for attacks
1
21. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Know the SSID and enter it manually
Security
Trojan/Rogue APs
802.11
22. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Three
BSSID (Basic Service Set identifier)
0
Workgroup Bridge mode.
23. Collisions are detected through the use of....
Single radio AP's
Acknowledgement frames
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11n
24. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
A VPN to the office network
3
Access point
Monitor
25. Typically a point-to-multipoint link consists of ____ connections
22MHz wide
WPA 2.0 personal and WPS
Three
Amplitude and phase
26. Which security feature provides the strongest security for a home-based wireless network?
Height of an RF signal
6 -12 - and 24 Mbps
Mesh
Passphrase
27. A newly configured wireless intrusion prevention system will___
Management - control - data
4 channels
Dual radio APs
Automatically monitor the network for attacks
28. Aireplay-ng -3
Arp
1 - 5.5 and 11 Mbps
Open system and Shared key
X.509 certificates on the subscriber side only.
29. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
FCC
ERP protection
802.11n
30. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Bridge mode
IPSec
Repeater
802.11n
31. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
CA - Collision avoidance
11
7
Wireless gateways
32. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
Small Office/Home Office Organizations (SOHO)
4 channels
X.509 certificates on the subscriber side only.
33. In order to set up an ad hoc network a user must know which two parameters?
Mismatched SSID
14
SSID and Channel
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
34. 4 types of Denial of Service attacks
802.11r
Two
Dynamic Rate switching
CTS attacks - Deauth attack - Association flood - Jamming
35. WI-Fi Protected Setup was designed for which of the following wireless applications?
Refraction
Small Office/Home Office Organizations (SOHO)
22MHz wide
WEP
36. 3 types of frames
Bridge mode
HT fixed mode
Point-to-point link
Management - control - data
37. As a device moves away from an access point - what is true regarding dynamic rate switching?
MAC
WPA 2.0 personal and WPS
Data rate increases
Transmitter and receiver
38. 802.11a uses which spread spectrum technology?
CA - Collision avoidance
OFDM
PIN
WPA2 -WEP
39. The length of a WEP key is typically ___ or ___
Diffraction
Enter a username and password that will be central administered
2.4-2.5GHz
64-bit - 128-bit
40. What best describes the Wi-Fi alliance?
Passive scan
Interoperability testing organization
TKIP - optional RC4
Management
41. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
802.11b HR/DSSS and 802.11 DSSS
UNII
Repeater
Personal mode and Enterprise Mode
42. The radio card can operate in one of up to six possible modes of operation...
SOHO brands that support WPS
HT 20 MHz protection mode
CTS attacks - Deauth attack - Association flood - Jamming
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
43. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
FHSS
Managed
Arp replay
44. Beacons allow client devices to ____ for available LANS
ERP-OFDM - DSSS
Passive scan
X.509 certificates on the subscriber side only.
DBi
45. Three types of passive WEP attacks
Brute force - statistical and dictionary
Mismatched SSID
Management
Authentication
46. This type of authentication is essentially 'Null authentication'
Repeater
LTE
Open system
14
47. 802.11w can only be used in networks using_____
Authentication
WPA Enterprise -WEP -MAC filters
WPA/WPA2
Beacons - Probe request - Probe response - Association Request - Reassociation Request
48. This is a topology in which two or more APs are connected by a common distribution system.
Wi-Fi Alliance
Open system
Extended Service Set (ESS)
Addresses wireless Quality of Service
49. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Obstacles
Dynamic Rate switching
DBi
1
50. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
SOHO brands that support WPS
Roaming
Unencrypted
WPA 2.0 personal and WPS