Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ___ acts as a hub for the WLAN; wireless frame pass through this device






2. The 802.11i amendment to the standard addresses which of the following technologies?






3. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






4. ____ is also known as the Protected management frame standard






5. Name two absolute measures of RF power






6. The Access point can operate in a variety of modes...






7. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






8. High Throughput mode 1






9. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






10. Point to Point links typically use which antenna types?






11. Wireless gateways come in two primary forms...






12. The security amendment to the IEEE 802.11 standard requires ____






13. A newly configured wireless intrusion prevention system will___






14. According to the 802.11a amendment - which data rates are mandatory?






15. Typically a point-to-multipoint link consists of ____ connections






16. What two devices use RF to communicate






17. Which items are unique to a service set identifier






18. The Layer 2 frame will be...






19. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






20. A basic service set identifier (BSSID) is the MAC address of the ____






21. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






22. In this mode a station can act as a relay or WLAN range extender






23. Layer 2 Tunneling Protocol commonly uses which encryption method?






24. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






25. What type of wireless network device is PIN-based security most commonly used with






26. Bridge mode will not allow client associations and is ______ only






27. Probe requests are used by clients as part of the ____ process






28. Name two relative measures of power






29. 4 types of Denial of Service attacks






30. Two authentication types defined in the 802.11 standard






31. A ______________ does not always use an omnidirectional antenna






32. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






33. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






34. Two characteristics of signals are






35. the amplitude of an RF signal is






36. Beacons allow client devices to ____ for available LANS






37. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






38. Which if the following organizations is responsible for standards compliance?






39. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






40. Name 3 channels considered non overlapping in the 2.4GHZ band






41. Which data encryption.authentication method is identified in the IEEE 802.11 standard






42. High Throughput mode 0






43. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






44. The radio card can operate in one of up to six possible modes of operation...






45. In order to set up an ad hoc network a user must know which two parameters?






46. A service set identifier (SSID) has a maximum limit of how many characters?






47. Which function does RBAC provide?






48. Collisions are detected through the use of....






49. WiMAX 802.16 authentication is based on...






50. Three types of MITM attacks







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests