Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What item has an effect on RF line of site?






2. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






3. In this mode a station can act as a relay or WLAN range extender






4. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






5. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






6. Which data encryption.authentication method is identified in the IEEE 802.11 standard






7. In repeater mode - the repeater device connects to a normal '___ mode'






8. Three types of passive WEP attacks






9. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






10. The open system authentication process uses how many frames?






11. Both ___ and ___ are wireless LAN security methods that support shared key security.






12. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






13. The association process happens after which phase?






14. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






15. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






16. Probe requests are used by clients as part of the ____ process






17. Which security feature provides the strongest security for a home-based wireless network?






18. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






19. Two authentication types defined in the 802.11 standard






20. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






21. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






22. A station can act as a routing node in a wireless mesh network






23. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






24. Point to Point links typically use which antenna types?






25. A basic service set (BSS) consists of how many access points






26. What is regarded in 802.11e?






27. Aireplay-ng -0






28. 802.11 uses CSMA/...






29. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






30. 3 types of antennas






31. The length of a WEP key is typically ___ or ___






32. Management frames are sent in....






33. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






34. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






35. What algorithm does WEP use






36. The Layer 2 frame will be...






37. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






38. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






39. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






40. What two devices use RF to communicate






41. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






42. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






43. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...






44. 802.11w can only be used in networks using_____






45. This type of authentication is essentially 'Null authentication'






46. Which process is a VPN solution intended to provide for users connection to a network






47. ___ are used to describe the basic components and topology of a WLAN






48. When a wireless LAN device listens for beacon frames - it is participating in which phase?






49. A weakness with MAC filtering is that it allows an intruder to ____






50. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?