SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What type of algorithm does WPA use
CA - Collision avoidance
25 MHz
Unencrypted
TKIP - optional RC4
2. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
Basic Service Set (BSS)
SSID and Channel
WPA2 -WEP
3. Bluetooth uses a radio technology called
Management
FHSS
Open system and Shared key
WPA/WPA2
4. In this mode - the card acts as a normal access point
Repeater
Master
Restricts access to authorized users
Trojan/Rogue APs
5. The 802.11g standard uses which two speed spectrum technologies.
ARP spoofing
Small Office/Home Office Organizations (SOHO)
ERP-OFDM - DSSS
Managed
6. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Interference from a neighboring access point RF denial-of-service (Dos) attack
7
RTS/CTS
Two
7. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Master
ISM
Open system
ERP-OFDM - DSSS
8. Two authentication types defined in the 802.11 standard
Trojan/Rogue APs
Encryption
Open system and Shared key
Station (STA)
9. This is the default mode that sets the card as a client that could then connect to an AP
Access point
Interoperability testing organization
Managed
Wireless gateways
10. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11r
CA - Collision avoidance
Authentication
802.11
11. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Refraction
LTE
X.509 certificates on the subscriber side only.
Carefully plan a strategy using WEP and VLANs
12. What item has an effect on RF line of site?
ERP protection
40 bit
Watt and mW
Obstacles
13. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11w
802.11n
TKIP - optional RC4
Workgroup Bridge mode.
14. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Interoperability testing organization
SOHO brands that support WPS
Fake auth
Bridge mode
15. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
Single radio AP's
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Mesh network
16. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
CA - Collision avoidance
Service sets
802.11b HR/DSSS and 802.11 DSSS
Management - control - data
17. 3 types of frames
Captive portal
Enter a username and password that will be central administered
Fakeauth
Management - control - data
18. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Ad-Hoc
Active mode
802.11r
BSSID (Basic Service Set identifier)
19. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Watt and mW
Trojan/Rogue APs
Amplitude and phase
Roaming
20. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Interoperability testing organization
BSSID (Basic Service Set identifier)
Mismatched SSID
Indoor and outdoor
21. Collisions are detected through the use of....
Acknowledgement frames
Spoof an address
40 bit
Workgroup Bridge mode.
22. ____ is also known as the Protected management frame standard
Wireless gateways
WPA 2.0 personal and WPS
802.11w
Master
23. Give two examples of WGB devices.
Antenna diversity
One or more
Arp replay
Wireless Game adapters and Media Bridges
24. 802.11b is capable of which data rates?
2.4-2.5GHz
Authenticate - associate
1 - 5.5 and 11 Mbps
Amplitude and phase
25. Management frames are sent in....
Personal mode and Enterprise Mode
Managed
Plaintext
Deauth
26. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Repeater
Captive portal
802.11g
4 channels
27. Name two relative measures of power
Dual radio APs
CCMP
DB and dBi
BSSID (Basic Service Set identifier)
28. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Monitor
ARP spoofing
Wireless Game adapters and Media Bridges
Mesh network
29. The Layer 2 frame will be...
UNII
Passphrase
802.11r
Unencrypted
30. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Transmitter and receiver
HT 20 MHz protection mode
Personal mode and Enterprise Mode
Bridge mode
31. ___ are used to describe the basic components and topology of a WLAN
Height of an RF signal
Brute force - statistical and dictionary
Dual radio APs
Service sets
32. Which security methods do 802.11g access points support?
WPA Enterprise -WEP -MAC filters
Walled Garden.
CTS attacks - Deauth attack - Association flood - Jamming
SSID (service set identifier)
33. Name 3 channels considered non overlapping in the 2.4GHZ band
Encryption
Security
Ad-Hoc
1 -6 -11
34. An Ack is expected for every____ frame transmitted
LTE
Unicast
32
Data rate increases
35. What best describes the Wi-Fi alliance?
Interoperability testing organization
Access point
Transmitter and receiver
Personal mode and Enterprise Mode
36. Which process is a VPN solution intended to provide for users connection to a network
HT fixed mode
Personal mode and Enterprise Mode
Secure Layer 3 transmissions over a public network infrastructure
Dynamic Rate switching
37. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Dual radio APs
Access point
Height of an RF signal
802.11i
38. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Access point
Other 802.11a devices
7
A VPN to the office network
39. 802.11a uses which spread spectrum technology?
Indoor and outdoor
CCMP
OFDM
BSSID (Basic Service Set identifier)
40. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Refraction
Restricts access to authorized users
Wireless gateways
Other 802.11a devices
41. What organization is responsible for unlicensed frequency band regulations in the United States?
Ad-Hoc
Semi directional and Highly directional
FCC
DBi
42. The length of a WEP key is typically ___ or ___
Unicast
Mesh
64-bit - 128-bit
AP radio
43. The capacity of an access point is dependent upon which factors?
Passve Scanning
Reflection
Number of users and software applications in use
CCMP
44. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
ERP protection
WPA/WPA2
802.11a
1 - 5.5 and 11 Mbps
45. Three types of passive WEP attacks
Service sets
Brute force - statistical and dictionary
HT fixed mode
Active mode
46. According to the 802.11a amendment - which data rates are mandatory?
ERP-OFDM - DSSS
Dictionary
Obstacles
6 -12 - and 24 Mbps
47. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
48. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Encryption
802.11a
Enter a username and password that will be central administered
ERP-OFDM - DSSS
49. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Secure Layer 3 transmissions over a public network infrastructure
Workgroup Bridge mode.
Dictionary
Unencrypted
50. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
ISM
2.4-2.5GHz
Wireless gateways
LTE