SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11w can only be used in networks using_____
Automatically monitor the network for attacks
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
WPA 2.0 personal and WPS
WPA/WPA2
2. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Transmitter and receiver
HT Non member protection mode
Captive portal
3. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Automatically monitor the network for attacks
802.11n
ARP spoofing
Single radio AP's
4. The 802.11i amendment to the standard addresses which of the following technologies?
Obstacles
4 channels
32 character maximum and is case sensitive
Security
5. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
802.11b HR/DSSS and 802.11 DSSS
Monitor
ISM
AP to AP
6. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
AP radio
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
One or more
7. In bluetooth - one master may communicate with up to ___ slaves in a piconet
WPA 2.0 personal and WPS
Active scanning
ARP spoofing
7
8. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Mesh network
Personal mode and Enterprise Mode
Passphrase
9. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
RTS/CTS
Trojan/Rogue APs - Arp spoofing - DNS spoofing
AP radio
Dynamic Rate switching
10. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Security
Plaintext
4 channels
11. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Ad-Hoc
Unicast
Dynamic Rate switching
Enter a username and password that will be central administered
12. What kind of Algorithm does WPA2 use?
AES = CCMP required
SSID (service set identifier)
WPA Enterprise -WEP -MAC filters
Data rate increases
13. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
802.11n
LTE
Arp
14. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Secure Layer 3 transmissions over a public network infrastructure
Roaming
15. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
FCC
Amplitude and phase
Active scanning
16. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Station (STA)
Bridge mode
Brute force - statistical and dictionary
Antenna diversity
17. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Greenfield mode
Mesh network
Interference from a neighboring access point RF denial-of-service (Dos) attack
AP to AP
18. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
DB and dBi
802.11w
Indoor and outdoor
Trojan/Rogue APs - Arp spoofing - DNS spoofing
19. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Refraction
WPA2 -WEP
HT Non member protection mode
1 -6 -11
20. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
One or more
RTS/CTS
IPSec
802.11g
21. Wireless gateways come in two primary forms...
CCMP
Residential and Enterprise
SSID and Channel
Watt and mW
22. 4 types of Denial of Service attacks
A VPN to the office network
WPA2
CTS attacks - Deauth attack - Association flood - Jamming
Fakeauth
23. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
3
Greenfield mode
Trojan/Rogue APs
14
24. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
4 channels
OFDM
2304 bytes
Dual radio APs
25. High Throughput mode 1
32
HT Non member protection mode
Greenfield mode
Unicast
26. The security amendment to the IEEE 802.11 standard requires ____
6 -12 - and 24 Mbps
Spoof an address
40 bit
CCMP
27. The Access point can operate in a variety of modes...
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Managed
Fake auth
UNII
28. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
Plaintext
Passphrase
RTS/CTS
29. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Mesh
LTE
ARP spoofing
Dynamic Rate switching
30. This is a topology in which two or more APs are connected by a common distribution system.
Walled Garden.
32 character maximum and is case sensitive
64-bit - 128-bit
Extended Service Set (ESS)
31. A ______________ does not always use an omnidirectional antenna
CA - Collision avoidance
RTS/CTS
Three
Point-to-point link
32. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
Height of an RF signal
802.11n
Obstacles
33. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
1
Single radio AP's
Root mode
34. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Addresses wireless Quality of Service
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
SSID (service set identifier)
35. Which items are unique to a service set identifier
Obstacles
Watt and mW
32 character maximum and is case sensitive
Master
36. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Transmitter and receiver
Wireless Game adapters and Media Bridges
DB and dBi
Mismatched SSID
37. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Security
802.11i
ERP-OFDM - DSSS
Semi directional and Highly directional
38. These are user configurable and present in only five 802.11 frame types...
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Degradation
Two
HT Non member protection mode
39. Name two relative measures of power
Active scanning
ERP protection
DB and dBi
Degradation
40. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
1 - 5.5 and 11 Mbps
Service sets
Passve Scanning
Client
41. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
WPA2
ISM
1 - 5.5 and 11 Mbps
42. Bluetooth uses a radio technology called
SSID and Channel
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Refraction
FHSS
43. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
WPA Enterprise -WEP -MAC filters
32
WPA/WPA2
44. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
4 channels
Dual radio APs
LTE
45. What type of algorithm does WPA use
0
TKIP - optional RC4
Station (STA)
Fake auth
46. The radio card can operate in one of up to six possible modes of operation...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Wireless Game adapters and Media Bridges
CCMP
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
47. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Roaming
Acknowledgement frames
SSID (service set identifier)
Restricts access to authorized users
48. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Passphrase
4 channels
Know the SSID and enter it manually
Captive portal
49. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
ERP-OFDM - DSSS
Mesh network
Data rate increases
A VPN to the office network
50. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183