SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In bluetooth - one master may communicate with up to ___ slaves in a piconet
TKIP - optional RC4
Bridge mode
7
Enter a username and password that will be central administered
2. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Encryption
Active scanning
FCC
Monitor
3. This is a topology in which two or more APs are connected by a common distribution system.
Repeater
Extended Service Set (ESS)
Know the SSID and enter it manually
Plaintext
4. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Height of an RF signal
Client
Managed
5. Which security methods do 802.11g access points support?
RTS/CTS
32
WPA Enterprise -WEP -MAC filters
802.11i
6. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
Passphrase
Active mode
WPA2
7. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Quality of Service
Automatically monitor the network for attacks
SOHO brands that support WPS
RTS/CTS
8. When an RF signal bounces off a smooth non absorptive surface - the behavior is
22MHz wide
Reflection
802.11r
Management - control - data
9. Aireplay-ng -1
2.4-2.5GHz
Beacons - Probe request - Probe response - Association Request - Reassociation Request
TKIP - optional RC4
Fakeauth
10. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
X.509 certificates on the subscriber side only.
Root mode
A VPN to the office network
802.11n
11. Aireplay-ng -3
Arp
802.11r
Watt and mW
DB and dBi
12. According to the 802.11a amendment - which data rates are mandatory?
6 -12 - and 24 Mbps
Encryption
Data rate increases
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
13. Three types of passive WEP attacks
Brute force - statistical and dictionary
32 character maximum and is case sensitive
Managed
Amplitude and phase
14. High Throughput mode 0
Greenfield mode
WPA2
Acknowledgement frames
Restricts access to authorized users
15. In order to set up an ad hoc network a user must know which two parameters?
Data rate increases
Independent
SSID and Channel
32 character maximum and is case sensitive
16. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
SOHO brands that support WPS
802.11a
802.11
Automatically monitor the network for attacks
17. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11
802.11b HR/DSSS and 802.11 DSSS
FCC
Obstacles
18. Beacons allow client devices to ____ for available LANS
64-bit - 128-bit
MAC
Passive scan
Number of users and software applications in use
19. 802.11b is capable of which data rates?
Authenticate - associate
X.509 certificates on the subscriber side only.
1 - 5.5 and 11 Mbps
DBi
20. 802.11g LAN operates in what frequency range?
Data rate increases
2.4-2.5GHz
Automatically monitor the network for attacks
Service sets
21. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
22. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Obstacles
Trojan/Rogue APs
Indoor and outdoor
LTE
23. These are user configurable and present in only five 802.11 frame types...
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Wi-Fi Alliance
BSSID (Basic Service Set identifier)
ERP protection
24. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
Fakeauth
HT fixed mode
1
25. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Interference from a neighboring access point RF denial-of-service (Dos) attack
ARP spoofing
Arp replay
Management
26. High throughput mode 3
32 character maximum and is case sensitive
HT fixed mode
Watt and mW
Wireless gateways
27. This type of authentication is essentially 'Null authentication'
Management
Open system
ISM
Obstacles
28. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
AES = CCMP required
802.11i
Ad-Hoc
29. Which if the following organizations is responsible for standards compliance?
Managed
Root mode
LTE
Wi-Fi Alliance
30. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
1 -6 -11
Indoor and outdoor
ISM
Data rate increases
31. Name 3 channels considered non overlapping in the 2.4GHZ band
1 -6 -11
Dual radio APs
Wireless Game adapters and Media Bridges
Mismatched SSID
32. An Ack is expected for every____ frame transmitted
CCMP
Unicast
Diffraction
Arp replay
33. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
0
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Unicast
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
34. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Dictionary
Repeater
PIN
One or more
35. What item has an effect on RF line of site?
Degradation
Authentication
Obstacles
802.11g
36. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Plaintext
Restricts access to authorized users
Wireless gateways
Captive portal
37. A station can act as a routing node in a wireless mesh network
Mesh
2.4-2.5GHz
Basic Service Set (BSS)
6 -12 - and 24 Mbps
38. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
7
WPA2
MAC
DB and dBi
39. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Quality of Service
14
Roaming
Obstacles
40. The security amendment to the IEEE 802.11 standard requires ____
CCMP
Unencrypted
Data rate increases
Bridge mode
41. An independent basic service set (IBSS) consists of how many access points?
Deauth
0
22MHz wide
802.11i
42. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Reflection
FHSS
AP radio
Mismatched SSID
43. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Service sets
25 MHz
Mesh network
Active scanning
44. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
Degradation
HT fixed mode
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
45. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Deauth
RC4
Client
ERP protection
46. 802.11 frames have a maximum 'upper-layer' payload of...
CCMP
2304 bytes
7
Acknowledgement frames
47. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Security
A VPN to the office network
Refraction
CA - Collision avoidance
48. Collisions are detected through the use of....
Acknowledgement frames
Repeater
Repeater
40 bit
49. Which function does RBAC provide?
Brute force - statistical and dictionary
Single radio AP's
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Restricts access to authorized users
50. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
1 - 5.5 and 11 Mbps
Amplitude and phase
DBi
4 channels