Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






2. 802.11 frames have a maximum 'upper-layer' payload of...






3. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






4. Which process is a VPN solution intended to provide for users connection to a network






5. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


6. What type of wireless network device is PIN-based security most commonly used with






7. Bridge mode will not allow client associations and is ______ only






8. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






9. Aireplay-ng -3






10. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






11. A pre-shared key mode may be vulnerable to a ____ attack






12. Maximum length of data (Frame body) is 2304 when ____ is not in use






13. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






14. When RF passes or bends around an obstacle such as a building or column - the behavior is






15. 802.11a uses which spread spectrum technology?






16. ____ is also known as the Protected management frame standard






17. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






18. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






19. The security amendment to the IEEE 802.11 standard requires ____






20. Bluetooth uses a radio technology called






21. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






22. Typically a point-to-multipoint link consists of ____ connections






23. Both ___ and ___ are wireless LAN security methods that support shared key security.






24. What type of certification came from 802.11i






25. A newly configured wireless intrusion prevention system will___






26. A station can act as a routing node in a wireless mesh network






27. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






28. A weakness with MAC filtering is that it allows an intruder to ____






29. This sets the card to participate in an independent basic service set






30. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






31. Wireless gateways come in two primary forms...






32. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






33. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






34. 3 types of frames






35. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






36. These are user configurable and present in only five 802.11 frame types...






37. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






38. Point to Point links typically use which antenna types?






39. Aireplay-ng -1






40. The Layer 2 frame will be...






41. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






42. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






43. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






44. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






45. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






46. WPA was developed as an interim solution for which amendment to the 802.11 standards?






47. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






48. Which security methods do 802.11g access points support?






49. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






50. the amplitude of an RF signal is