SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The open system authentication process uses how many frames?
Spoof an address
Wavelength
Two
Active mode
2. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Roaming
Two
CCMP
3. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
802.11n
2.4-2.5GHz
2304 bytes
4. Which process is a VPN solution intended to provide for users connection to a network
BSSID (Basic Service Set identifier)
Mismatched SSID
WPA/WPA2
Secure Layer 3 transmissions over a public network infrastructure
5. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Extended Service Set (ESS)
HT 20 MHz protection mode
802.11w
Refraction
6. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
2.4-2.5GHz
WEP
One or more
7. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
RTS/CTS
Indoor and outdoor
CTS attacks - Deauth attack - Association flood - Jamming
8. A service set identifier (SSID) has a maximum limit of how many characters?
UNII
32
Beacons - Probe request - Probe response - Association Request - Reassociation Request
1 -6 -11
9. Which function does RBAC provide?
Restricts access to authorized users
Single radio AP's
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
WEP
10. Aireplay-ng -1
Fakeauth
Managed
WPA2
Wireless gateways
11. Name 3 channels considered non overlapping in the 2.4GHZ band
Data rate increases
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
1 -6 -11
Passphrase
12. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Refraction
HT 20 MHz protection mode
SSID (service set identifier)
Root mode
13. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Passive scan
Watt and mW
Access point
RTS/CTS
14. High Throughput mode 1
Extended Service Set (ESS)
HT Non member protection mode
Captive portal
Passive scan
15. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Personal mode and Enterprise Mode
ARP spoofing
Master
Arp
16. Which if the following organizations is responsible for standards compliance?
Single radio AP's
802.11g
RTS/CTS
Wi-Fi Alliance
17. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Root mode
1
Restricts access to authorized users
Workgroup Bridge mode.
18. Bluetooth uses a radio technology called
Fake auth
FHSS
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
IPSec
19. A basic service set (BSS) consists of how many access points
Wi-Fi Alliance
Single radio AP's
Wavelength
1
20. An Ack is expected for every____ frame transmitted
Unicast
Monitor
WPA 2.0 personal and WPS
Beacons - Probe request - Probe response - Association Request - Reassociation Request
21. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Station (STA)
Passive scan
Wireless gateways
802.11b HR/DSSS and 802.11 DSSS
22. In order to set up an ad hoc network a user must know which two parameters?
IPSec
SSID and Channel
Passve Scanning
Trojan/Rogue APs
23. 3 types of antennas
LTE
Access point
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
802.11n
24. Typically a point-to-multipoint link consists of ____ connections
Roaming
Height of an RF signal
Three
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
25. 802.11w can only be used in networks using_____
DBi
Know the SSID and enter it manually
WPA/WPA2
40 bit
26. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Small Office/Home Office Organizations (SOHO)
3
Mesh network
Service sets
27. Which items are unique to a service set identifier
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Point-to-point link
Residential and Enterprise
32 character maximum and is case sensitive
28. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
2304 bytes
Fakeauth
Degradation
29. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Service sets
HT fixed mode
Repeater
Ad-Hoc
30. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
Enter a username and password that will be central administered
Quality of Service
Beacons - Probe request - Probe response - Association Request - Reassociation Request
31. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
Authentication
Personal mode and Enterprise Mode
Brute force - statistical and dictionary
32. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
Workgroup Bridge mode.
1 - 5.5 and 11 Mbps
Open system and Shared key
33. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
AP to AP
Authenticate - associate
Workgroup Bridge mode.
RTS/CTS
34. Layer 2 Tunneling Protocol commonly uses which encryption method?
FHSS
WPA/WPA2
IPSec
0
35. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Master
ERP protection
ERP-OFDM - DSSS
Passve Scanning
36. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
802.11n
CCMP
Wireless Game adapters and Media Bridges
11
37. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
Wavelength
CCMP
11
38. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
1
ISM
OFDM
Restricts access to authorized users
39. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Watt and mW
Other 802.11a devices
Know the SSID and enter it manually
WPA/WPA2
41. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Reflection
Know the SSID and enter it manually
40 bit
42. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Carefully plan a strategy using WEP and VLANs
Single radio AP's
Unencrypted
25 MHz
43. This is the default mode that sets the card as a client that could then connect to an AP
Mesh
AES = CCMP required
Managed
Quality of Service
44. Name two relative measures of power
LTE
Arp
DB and dBi
WPA 2.0 personal and WPS
45. The radio card can operate in one of up to six possible modes of operation...
Basic Service Set (BSS)
Wireless gateways
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
UNII
46. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
WPA/WPA2
CCMP
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Trojan/Rogue APs
47. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Wi-Fi Alliance
AP radio
Interference from a neighboring access point RF denial-of-service (Dos) attack
ISM
48. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
1 - 5.5 and 11 Mbps
11
Antenna diversity
49. the amplitude of an RF signal is
RTS/CTS
22MHz wide
802.11n
Height of an RF signal
50. The Layer 2 frame will be...
Unencrypted
Wireless Game adapters and Media Bridges
ERP-OFDM - DSSS
Reflection