SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Authenticate - associate
SSID (service set identifier)
Open system and Shared key
Managed
2. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
LTE
Open system
802.11g
3. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
FCC
6 -12 - and 24 Mbps
Number of users and software applications in use
4. This is typically the 48-bit MAC address of the access point's radio card.
Independent
BSSID (Basic Service Set identifier)
32 character maximum and is case sensitive
Acknowledgement frames
5. Three types of passive WEP attacks
802.11g
A VPN to the office network
Brute force - statistical and dictionary
Passphrase
6. What item has an effect on RF line of site?
Frequency
Obstacles
Monitor
Basic Service Set (BSS)
7. The Layer 2 frame will be...
CCMP
Unencrypted
Single radio AP's
SSID and Channel
8. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
1 - 5.5 and 11 Mbps
Station (STA)
Management - control - data
Access point
9. What organization is responsible for unlicensed frequency band regulations in the United States?
Enter a username and password that will be central administered
FCC
RTS/CTS
SSID and Channel
10. What is the gain of an antenna measured in
Basic Service Set (BSS)
Addresses wireless Quality of Service
WPA 2.0 personal and WPS
DBi
11. A station can act as a routing node in a wireless mesh network
Quality of Service
802.11i
Mesh
X.509 certificates on the subscriber side only.
12. Aireplay-ng -0
Repeater
Acknowledgement frames
Fakeauth
Deauth
13. High throughput mode 3
UNII
Transmitter and receiver
Number of users and software applications in use
HT fixed mode
14. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Workgroup Bridge mode.
2304 bytes
Active mode
Number of users and software applications in use
15. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Antenna diversity
ISM
Spoof an address
PIN
16. Which process is a VPN solution intended to provide for users connection to a network
Active mode
Watt and mW
HT Non member protection mode
Secure Layer 3 transmissions over a public network infrastructure
17. A service set identifier (SSID) has a maximum limit of how many characters?
Bridge mode
Frequency
32
7
18. What type of algorithm does WPA use
TKIP - optional RC4
2.4-2.5GHz
ARP spoofing
1
19. An Ack is expected for every____ frame transmitted
Unicast
CCMP
802.11b
Frequency
20. an 802.11b 2.4GHz channel is how wide in MHz?
AP to AP
802.11i
22MHz wide
Spoof an address
21. Name two relative measures of power
4 channels
DB and dBi
CA - Collision avoidance
Secure Layer 3 transmissions over a public network infrastructure
22. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Basic Service Set (BSS)
Point-to-point link
Repeater
PIN
23. The radio card can operate in one of up to six possible modes of operation...
Enter a username and password that will be central administered
CA - Collision avoidance
CCMP
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
24. What type of wireless network device is PIN-based security most commonly used with
Automatically monitor the network for attacks
SOHO brands that support WPS
Watt and mW
Personal mode and Enterprise Mode
25. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Carefully plan a strategy using WEP and VLANs
22MHz wide
Deauth
3
26. Give two examples of WGB devices.
2.4-2.5GHz
Restricts access to authorized users
Open system and Shared key
Wireless Game adapters and Media Bridges
27. Bridge mode will not allow client associations and is ______ only
SSID and Channel
Extended Service Set (ESS)
Deauth
AP to AP
28. Layer 2 Tunneling Protocol commonly uses which encryption method?
Master
IPSec
Active mode
Quality of Service
29. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
Refraction
PIN
Active scanning
30. 802.11b is capable of which data rates?
Carefully plan a strategy using WEP and VLANs
1 - 5.5 and 11 Mbps
Wi-Fi Alliance
0
31. The capacity of an access point is dependent upon which factors?
Workgroup Bridge mode.
Number of users and software applications in use
Basic Service Set (BSS)
AP radio
32. Bluetooth uses a radio technology called
RTS/CTS
WPA2
2.4-2.5GHz
FHSS
33. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
802.11r
802.11b HR/DSSS and 802.11 DSSS
WPA/WPA2
Quality of Service
34. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Height of an RF signal
802.11b
Acknowledgement frames
Passve Scanning
35. Name 3 channels considered non overlapping in the 2.4GHZ band
Interference from a neighboring access point RF denial-of-service (Dos) attack
1 -6 -11
Trojan/Rogue APs
SOHO brands that support WPS
36. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
Height of an RF signal
32
4 channels
37. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Monitor
Carefully plan a strategy using WEP and VLANs
Plaintext
Wireless gateways
38. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Obstacles
Authenticate - associate
Small Office/Home Office Organizations (SOHO)
Dictionary
39. Beacons allow client devices to ____ for available LANS
Passive scan
ISM
Unicast
Mesh network
40. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
Fake auth
SOHO brands that support WPS
Unicast
41. The length of a WEP key is typically ___ or ___
Interoperability testing organization
11
64-bit - 128-bit
1 -6 -11
42. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Semi directional and Highly directional
Access point
Management
32
43. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
Encryption
MAC
OFDM
44. Both ___ and ___ are wireless LAN security methods that support shared key security.
AP radio
WPA2 -WEP
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Master
45. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Encryption
11
Basic Service Set (BSS)
Wireless gateways
46. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Residential and Enterprise
Fakeauth
Active mode
47. A ______________ does not always use an omnidirectional antenna
Spoof an address
Point-to-point link
Acknowledgement frames
Other 802.11a devices
48. Which items are unique to a service set identifier
SOHO brands that support WPS
802.11b
32 character maximum and is case sensitive
1 - 5.5 and 11 Mbps
49. 802.11g LAN operates in what frequency range?
Open system
Wavelength
2.4-2.5GHz
Single radio AP's
50. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Passve Scanning
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Dynamic Rate switching
Fakeauth