SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Passve Scanning
Enter a username and password that will be central administered
Arp replay
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
2. 802.11 frames have a maximum 'upper-layer' payload of...
Extended Service Set (ESS)
2304 bytes
WPA 2.0 personal and WPS
Walled Garden.
3. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
Arp
Height of an RF signal
DB and dBi
4. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
Residential and Enterprise
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
MAC
5. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
Security
TKIP - optional RC4
Ad-Hoc
6. High Throughput mode 1
25 MHz
Extended Service Set (ESS)
Arp replay
HT Non member protection mode
7. This is typically the 48-bit MAC address of the access point's radio card.
Root mode
WPA2 -WEP
Wireless gateways
BSSID (Basic Service Set identifier)
8. the amplitude of an RF signal is
32 character maximum and is case sensitive
Mesh network
14
Height of an RF signal
9. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Arp replay
Roaming
Personal mode and Enterprise Mode
AP radio
10. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
802.11n
Basic Service Set (BSS)
11. Aireplay-ng -1
Bridge mode
Mesh network
Fakeauth
Active mode
12. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Obstacles
Wavelength
Encryption
13. Maximum length of data (Frame body) is 2304 when ____ is not in use
Management
Indoor and outdoor
Encryption
Automatically monitor the network for attacks
14. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
0
Access point
AES = CCMP required
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
15. What two devices use RF to communicate
Restricts access to authorized users
Transmitter and receiver
22MHz wide
Brute force - statistical and dictionary
16. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
Diffraction
22MHz wide
Management
17. Collisions are detected through the use of....
Acknowledgement frames
Station (STA)
Restricts access to authorized users
Unicast
18. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Wireless Game adapters and Media Bridges
Point-to-point link
AES = CCMP required
Dynamic Rate switching
19. A ______________ does not always use an omnidirectional antenna
X.509 certificates on the subscriber side only.
AP to AP
Managed
Point-to-point link
20. Three types of passive WEP attacks
Three
Watt and mW
64-bit - 128-bit
Brute force - statistical and dictionary
21. Which if the following organizations is responsible for standards compliance?
Management
LTE
2.4-2.5GHz
Wi-Fi Alliance
22. 802.11b is capable of which data rates?
Passive scan
1 - 5.5 and 11 Mbps
Basic Service Set (BSS)
DB and dBi
23. What is regarded in 802.11e?
Encryption
SSID (service set identifier)
Authentication
Addresses wireless Quality of Service
24. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Carefully plan a strategy using WEP and VLANs
4 channels
Addresses wireless Quality of Service
Antenna diversity
25. WI-Fi Protected Setup was designed for which of the following wireless applications?
Small Office/Home Office Organizations (SOHO)
25 MHz
Security
Dynamic Rate switching
26. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Fake auth
IPSec
Basic Service Set (BSS)
27. Probe requests are used by clients as part of the ____ process
4 channels
UNII
Open system and Shared key
Active scanning
28. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
29. Which items are unique to a service set identifier
TKIP - optional RC4
32 character maximum and is case sensitive
11
6 -12 - and 24 Mbps
30. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Amplitude and phase
64-bit - 128-bit
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Wireless gateways
31. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
DB and dBi
Client
6 -12 - and 24 Mbps
Wireless gateways
32. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Active mode
22MHz wide
Dynamic Rate switching
33. What kind of Algorithm does WPA2 use?
AES = CCMP required
Frequency
32 character maximum and is case sensitive
Wireless gateways
34. High Throughput mode 0
Greenfield mode
Two
Enter a username and password that will be central administered
25 MHz
35. What type of certification came from 802.11i
BSSID (Basic Service Set identifier)
WPA2
AES = CCMP required
Semi directional and Highly directional
36. As a device moves away from an access point - what is true regarding dynamic rate switching?
Frequency
Data rate increases
Mesh network
FHSS
37. 4 types of Denial of Service attacks
Three
ERP-OFDM - DSSS
CTS attacks - Deauth attack - Association flood - Jamming
RTS/CTS
38. 3 types of antennas
Workgroup Bridge mode.
802.11g
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Bridge mode
39. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Semi directional and Highly directional
SSID (service set identifier)
Bridge mode
Secure Layer 3 transmissions over a public network infrastructure
40. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
22MHz wide
Carefully plan a strategy using WEP and VLANs
Open system
41. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Enter a username and password that will be central administered
Frequency
Bridge mode
Access point
42. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Degradation
64-bit - 128-bit
Passphrase
43. What type of algorithm does WPA use
Mesh
WPA2 -WEP
Service sets
TKIP - optional RC4
44. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11b
802.11i
Wireless gateways
WPA2
45. What best describes the Wi-Fi alliance?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Interoperability testing organization
HT 20 MHz protection mode
Unencrypted
46. Aireplay-ng -0
Deauth
Secure Layer 3 transmissions over a public network infrastructure
14
Active mode
47. This sets the card to participate in an independent basic service set
Encryption
3
Ad-Hoc
Captive portal
48. These are user configurable and present in only five 802.11 frame types...
SSID and Channel
Automatically monitor the network for attacks
Management - control - data
Beacons - Probe request - Probe response - Association Request - Reassociation Request
49. 802.11a uses which spread spectrum technology?
OFDM
DBi
Point-to-point link
SSID (service set identifier)
50. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
Indoor and outdoor
32 character maximum and is case sensitive
Point-to-point link