SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
Number of users and software applications in use
Interoperability testing organization
Dictionary
2. A basic service set (BSS) consists of how many access points
Personal mode and Enterprise Mode
Interference from a neighboring access point RF denial-of-service (Dos) attack
11
1
3. Collisions are detected through the use of....
Trojan/Rogue APs - Arp spoofing - DNS spoofing
32
Acknowledgement frames
Mesh
4. ____ is also known as the Protected management frame standard
802.11w
Semi directional and Highly directional
Extended Service Set (ESS)
1 - 5.5 and 11 Mbps
5. The Access point can operate in a variety of modes...
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Single radio AP's
Captive portal
Mesh
6. The Layer 2 frame will be...
Unencrypted
Roaming
802.11b
Automatically monitor the network for attacks
7. An independent basic service set (IBSS) consists of how many access points?
AP to AP
64-bit - 128-bit
Small Office/Home Office Organizations (SOHO)
0
8. The process in which a wireless LAN clients connection moves from one access point to another is called ______
FHSS
Active scanning
Roaming
Wireless gateways
9. Which data encryption.authentication method is identified in the IEEE 802.11 standard
64-bit - 128-bit
WEP
Management
Know the SSID and enter it manually
10. Typically a point-to-multipoint link consists of ____ connections
Station (STA)
Active mode
Three
BSSID (Basic Service Set identifier)
11. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Antenna diversity
A VPN to the office network
Wavelength
FCC
12. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Unencrypted
802.11r
Trojan/Rogue APs
Captive portal
13. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
802.11b
ERP protection
Workgroup Bridge mode.
X.509 certificates on the subscriber side only.
14. The 802.11g standard uses which two speed spectrum technologies.
Number of users and software applications in use
ERP-OFDM - DSSS
64-bit - 128-bit
Antenna diversity
15. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
OFDM
Other 802.11a devices
Security
Dictionary
16. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
Amplitude and phase
Walled Garden.
1 - 5.5 and 11 Mbps
17. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
1
Frequency
22MHz wide
18. What type of wireless network device is PIN-based security most commonly used with
Mesh network
Addresses wireless Quality of Service
SOHO brands that support WPS
IPSec
19. This sets the card to participate in an independent basic service set
Wireless Game adapters and Media Bridges
Repeater
Workgroup Bridge mode.
Ad-Hoc
20. A newly configured wireless intrusion prevention system will___
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
802.11b HR/DSSS and 802.11 DSSS
Automatically monitor the network for attacks
14
21. The length of a WEP key is typically ___ or ___
Authentication
64-bit - 128-bit
Client
2.4-2.5GHz
22. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
WPA 2.0 personal and WPS
Spoof an address
Indoor and outdoor
Data rate increases
23. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Bridge mode
Trojan/Rogue APs
LTE
SSID (service set identifier)
24. Which security feature provides the strongest security for a home-based wireless network?
DBi
Know the SSID and enter it manually
Reflection
Passphrase
25. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
Residential and Enterprise
Two
Encryption
26. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Trojan/Rogue APs
Height of an RF signal
Reflection
Station (STA)
27. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Height of an RF signal
DBi
Management
64-bit - 128-bit
28. What is the gain of an antenna measured in
Reflection
Automatically monitor the network for attacks
DBi
AP radio
29. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passphrase
Single radio AP's
Passve Scanning
Master
30. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Active mode
Amplitude and phase
7
11
31. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
2.4-2.5GHz
1 -6 -11
Station (STA)
LTE
32. In repeater mode - the repeater device connects to a normal '___ mode'
802.11a
Root mode
Master
WPA2 -WEP
33. Three types of passive WEP attacks
TKIP - optional RC4
2.4-2.5GHz
Monitor
Brute force - statistical and dictionary
34. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
Access point
Basic Service Set (BSS)
Master
35. The association process happens after which phase?
Authentication
Height of an RF signal
Two
1
36. Bluetooth uses a radio technology called
FHSS
Secure Layer 3 transmissions over a public network infrastructure
2304 bytes
Extended Service Set (ESS)
37. What two devices use RF to communicate
DB and dBi
Root mode
Transmitter and receiver
Trojan/Rogue APs - Arp spoofing - DNS spoofing
38. 802.11a uses which spread spectrum technology?
OFDM
40 bit
Active scanning
Trojan/Rogue APs
39. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
802.11b
Station (STA)
RC4
40. an 802.11b 2.4GHz channel is how wide in MHz?
Access point
Small Office/Home Office Organizations (SOHO)
Active scanning
22MHz wide
41. A station can act as a routing node in a wireless mesh network
Fakeauth
Acknowledgement frames
2.4-2.5GHz
Mesh
42. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
1 - 5.5 and 11 Mbps
802.11w
22MHz wide
43. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Independent
FHSS
ISM
44. This is typically the 48-bit MAC address of the access point's radio card.
Residential and Enterprise
802.11n
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
BSSID (Basic Service Set identifier)
45. Aireplay-ng -3
Arp
32 character maximum and is case sensitive
Addresses wireless Quality of Service
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
46. Aireplay-ng -0
Deauth
TKIP - optional RC4
Open system and Shared key
Interference from a neighboring access point RF denial-of-service (Dos) attack
47. The security amendment to the IEEE 802.11 standard requires ____
Fake auth
Data rate increases
CCMP
Master
48. WI-Fi Protected Setup was designed for which of the following wireless applications?
Wireless gateways
Small Office/Home Office Organizations (SOHO)
25 MHz
802.11n
49. 4 types of Denial of Service attacks
Repeater
A VPN to the office network
40 bit
CTS attacks - Deauth attack - Association flood - Jamming
50. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Station (STA)
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
AES = CCMP required
Access point