Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






2. An Ack is expected for every____ frame transmitted






3. A ______________ does not always use an omnidirectional antenna






4. Both ___ and ___ are wireless LAN security methods that support shared key security.






5. A newly configured wireless intrusion prevention system will___






6. What is regarded in 802.11e?






7. Name 3 channels considered non overlapping in the 2.4GHZ band






8. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






9. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






10. When an RF signal bounces off a smooth non absorptive surface - the behavior is






11. Which function does RBAC provide?






12. This type of authentication is essentially 'Null authentication'






13. Which items are unique to a service set identifier






14. Probe requests are used by clients as part of the ____ process






15. Which process is a VPN solution intended to provide for users connection to a network






16. A brute force attack is limited to breaking___ WEP keys






17. In order to set up an ad hoc network a user must know which two parameters?






18. The capacity of an access point is dependent upon which factors?






19. A pre-shared key mode may be vulnerable to a ____ attack






20. Bridge mode will not allow client associations and is ______ only






21. What kind of Algorithm does WPA2 use?






22. High throughput mode 2






23. The security amendment to the IEEE 802.11 standard requires ____






24. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






25. High throughput mode 3






26. 3 types of antennas






27. WiMAX 802.16 authentication is based on...






28. 802.11w can only be used in networks using_____






29. Name two relative measures of power






30. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






31. When RF passes or bends around an obstacle such as a building or column - the behavior is






32. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






33. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






34. An independent basic service set (IBSS) consists of how many access points?






35. Bluetooth uses a radio technology called






36. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






37. The association process happens after which phase?






38. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






39. The open system authentication process uses how many frames?






40. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






41. The Layer 2 frame will be...






42. 802.11b is capable of which data rates?






43. This is the default mode that sets the card as a client that could then connect to an AP






44. Which security methods do 802.11g access points support?






45. This sets the card to participate in an independent basic service set






46. Which security feature provides the strongest security for a home-based wireless network?






47. The length of a WEP key is typically ___ or ___






48. What type of wireless network device is PIN-based security most commonly used with






49. Three types of MITM attacks






50. ___ is the topology in which no AP participates - client devices communicate directly to eachother.