Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A service set identifier (SSID) has a maximum limit of how many characters?






2. This is a topology in which two or more APs are connected by a common distribution system.






3. An Ack is expected for every____ frame transmitted






4. Wireless gateways come in two primary forms...






5. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






6. What is the gain of an antenna measured in






7. Collisions are detected through the use of....






8. This sets the card to participate in an independent basic service set






9. Give two examples of WGB devices.






10. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...






11. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






12. The security amendment to the IEEE 802.11 standard requires ____






13. 802.11 uses CSMA/...






14. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






15. ___ are used to describe the basic components and topology of a WLAN






16. What two devices use RF to communicate






17. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






18. These are user configurable and present in only five 802.11 frame types...






19. The process in which a wireless LAN clients connection moves from one access point to another is called ______






20. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






21. As a device moves away from an access point - what is true regarding dynamic rate switching?






22. Which security methods do 802.11g access points support?






23. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






24. A weakness with MAC filtering is that it allows an intruder to ____






25. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






26. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






27. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






28. Which items are unique to a service set identifier






29. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






30. A basic service set identifier (BSSID) is the MAC address of the ____






31. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






32. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






33. Two characteristics of signals are






34. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






35. Name two relative measures of power






36. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






37. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






38. Aireplay-ng -1






39. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






40. When a wireless LAN device listens for beacon frames - it is participating in which phase?






41. A newly configured wireless intrusion prevention system will___






42. WiMAX 802.16 authentication is based on...






43. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






44. A ______________ does not always use an omnidirectional antenna






45. The 802.11g standard uses which two speed spectrum technologies.






46. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






47. A station can act as a routing node in a wireless mesh network






48. The Layer 2 frame will be...






49. Name 3 channels considered non overlapping in the 2.4GHZ band






50. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s