SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An independent basic service set (IBSS) consists of how many access points?
Semi directional and Highly directional
0
Fake auth
802.11b
2. These are user configurable and present in only five 802.11 frame types...
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Addresses wireless Quality of Service
Ad-Hoc
Plaintext
3. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
64-bit - 128-bit
802.11b HR/DSSS and 802.11 DSSS
Brute force - statistical and dictionary
4. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Root mode
25 MHz
Passve Scanning
Open system
5. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Authenticate - associate
ERP protection
Other 802.11a devices
WPA2 -WEP
6. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
WPA2
802.11r
UNII
Passive scan
7. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
SSID (service set identifier)
Two
Carefully plan a strategy using WEP and VLANs
8. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Access point
Root mode
802.11i
Master
9. 3 types of antennas
Single radio AP's
Arp replay
Roaming
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
10. Point to Point links typically use which antenna types?
Passve Scanning
Reflection
Watt and mW
Semi directional and Highly directional
11. Which security methods do 802.11g access points support?
Quality of Service
AES = CCMP required
Restricts access to authorized users
WPA Enterprise -WEP -MAC filters
12. WiMAX 802.16 authentication is based on...
SOHO brands that support WPS
Unicast
X.509 certificates on the subscriber side only.
TKIP - optional RC4
13. The open system authentication process uses how many frames?
UNII
Two
Diffraction
Monitor
14. Maximum length of data (Frame body) is 2304 when ____ is not in use
Passphrase
Encryption
Security
Wireless gateways
15. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
IPSec
OFDM
Extended Service Set (ESS)
16. Beacons allow client devices to ____ for available LANS
Passive scan
Personal mode and Enterprise Mode
Greenfield mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
17. When a wireless LAN device listens for beacon frames - it is participating in which phase?
0
Passve Scanning
14
Addresses wireless Quality of Service
18. ___ are used to describe the basic components and topology of a WLAN
Root mode
Antenna diversity
Service sets
Management
19. In this mode - the card acts as a normal access point
Master
32
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Mesh
20. High Throughput mode 0
Greenfield mode
Secure Layer 3 transmissions over a public network infrastructure
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Passve Scanning
21. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Greenfield mode
FCC
SOHO brands that support WPS
802.11n
22. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
23. Typically a point-to-multipoint link consists of ____ connections
Three
WPA/WPA2
Walled Garden.
2.4-2.5GHz
24. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
HT 20 MHz protection mode
3
Open system and Shared key
11
25. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Brute force - statistical and dictionary
32 character maximum and is case sensitive
Basic Service Set (BSS)
Ad-Hoc
26. Which process is a VPN solution intended to provide for users connection to a network
1 -6 -11
MAC
Secure Layer 3 transmissions over a public network infrastructure
OFDM
27. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
3
Arp replay
HT Non member protection mode
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
28. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Walled Garden.
Enter a username and password that will be central administered
Know the SSID and enter it manually
Personal mode and Enterprise Mode
29. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Data rate increases
PIN
DB and dBi
LTE
30. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
32 character maximum and is case sensitive
Monitor
Passve Scanning
802.11
31. A weakness with MAC filtering is that it allows an intruder to ____
Plaintext
802.11
LTE
Spoof an address
32. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
Encryption
TKIP - optional RC4
32
33. Which data encryption.authentication method is identified in the IEEE 802.11 standard
WPA 2.0 personal and WPS
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
WEP
Antenna diversity
34. High Throughput mode 1
Passphrase
RTS/CTS
Point-to-point link
HT Non member protection mode
35. What item has an effect on RF line of site?
Greenfield mode
Obstacles
802.11i
32 character maximum and is case sensitive
36. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
SSID (service set identifier)
Captive portal
Fake auth
Access point
37. An Ack is expected for every____ frame transmitted
Unicast
Know the SSID and enter it manually
Management - control - data
Wi-Fi Alliance
38. What algorithm does WEP use
RC4
2.4-2.5GHz
Transmitter and receiver
22MHz wide
39. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Interoperability testing organization
WPA 2.0 personal and WPS
TKIP - optional RC4
40. A service set identifier (SSID) has a maximum limit of how many characters?
32
Amplitude and phase
Ad-Hoc
802.11i
41. Two characteristics of signals are
14
Amplitude and phase
Trojan/Rogue APs
40 bit
42. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
802.11n
Active mode
Indoor and outdoor
Master
43. What organization is responsible for unlicensed frequency band regulations in the United States?
Transmitter and receiver
Authenticate - associate
FCC
22MHz wide
44. Name two relative measures of power
Restricts access to authorized users
22MHz wide
Wireless Game adapters and Media Bridges
DB and dBi
45. High throughput mode 3
Small Office/Home Office Organizations (SOHO)
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
HT fixed mode
HT 20 MHz protection mode
46. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Fakeauth
Dual radio APs
Know the SSID and enter it manually
SOHO brands that support WPS
47. The length of a WEP key is typically ___ or ___
Interference from a neighboring access point RF denial-of-service (Dos) attack
Watt and mW
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
64-bit - 128-bit
48. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Mismatched SSID
40 bit
2.4-2.5GHz
Watt and mW
49. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Enter a username and password that will be central administered
Wi-Fi Alliance
4 channels
Independent
50. Give two examples of WGB devices.
Root mode
DBi
Authenticate - associate
Wireless Game adapters and Media Bridges