SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is the default mode that sets the card as a client that could then connect to an AP
802.11r
RTS/CTS
Managed
Workgroup Bridge mode.
2. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Interference from a neighboring access point RF denial-of-service (Dos) attack
One or more
Automatically monitor the network for attacks
Mismatched SSID
3. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Access point
802.11b
802.11g
802.11
4. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
5. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Fake auth
802.11
Arp replay
1 - 5.5 and 11 Mbps
6. Bluetooth uses a radio technology called
DB and dBi
6 -12 - and 24 Mbps
FHSS
Extended Service Set (ESS)
7. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Management
Authenticate - associate
14
Arp replay
8. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Independent
UNII
IPSec
9. A station can act as a routing node in a wireless mesh network
Other 802.11a devices
CTS attacks - Deauth attack - Association flood - Jamming
HT 20 MHz protection mode
Mesh
10. In bluetooth - one master may communicate with up to ___ slaves in a piconet
7
Dual radio APs
FCC
A VPN to the office network
11. The Access point can operate in a variety of modes...
Plaintext
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
DBi
Bridge mode
12. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
HT fixed mode
DBi
Extended Service Set (ESS)
13. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Ad-Hoc
Dual radio APs
14. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Carefully plan a strategy using WEP and VLANs
Other 802.11a devices
AES = CCMP required
ISM
15. High throughput mode 2
Wi-Fi Alliance
HT 20 MHz protection mode
Dictionary
Extended Service Set (ESS)
16. What organization is responsible for unlicensed frequency band regulations in the United States?
Active mode
TKIP - optional RC4
FCC
14
17. What item has an effect on RF line of site?
Wireless gateways
CCMP
Obstacles
22MHz wide
18. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11g
Passphrase
802.11n
Authentication
19. When RF passes or bends around an obstacle such as a building or column - the behavior is
Captive portal
Diffraction
6 -12 - and 24 Mbps
Station (STA)
20. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Authenticate - associate
Single radio AP's
Addresses wireless Quality of Service
Antenna diversity
21. What is the gain of an antenna measured in
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Security
802.11i
DBi
22. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
6 -12 - and 24 Mbps
1 - 5.5 and 11 Mbps
802.11r
Automatically monitor the network for attacks
23. Which function does RBAC provide?
Fakeauth
Restricts access to authorized users
Spoof an address
2.4-2.5GHz
24. High Throughput mode 0
Encryption
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Ad-Hoc
Greenfield mode
25. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Enter a username and password that will be central administered
MAC
Addresses wireless Quality of Service
26. What is regarded in 802.11e?
LTE
Authenticate - associate
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Addresses wireless Quality of Service
27. In repeater mode - the repeater device connects to a normal '___ mode'
RC4
IPSec
Root mode
Diffraction
28. When a wireless LAN device listens for beacon frames - it is participating in which phase?
802.11i
Passve Scanning
ERP protection
Active scanning
29. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
Obstacles
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Mesh network
30. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
Active scanning
Management
22MHz wide
31. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Frequency
CTS attacks - Deauth attack - Association flood - Jamming
Small Office/Home Office Organizations (SOHO)
Extended Service Set (ESS)
32. Three types of MITM attacks
SOHO brands that support WPS
1
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Obstacles
33. The open system authentication process uses how many frames?
Semi directional and Highly directional
Enter a username and password that will be central administered
Root mode
Two
34. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
Ad-Hoc
FHSS
Basic Service Set (BSS)
35. 802.11 uses CSMA/...
CA - Collision avoidance
Data rate increases
Walled Garden.
WEP
36. What two devices use RF to communicate
Transmitter and receiver
ERP-OFDM - DSSS
Monitor
Spoof an address
37. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Deauth
32 character maximum and is case sensitive
Mesh network
Addresses wireless Quality of Service
38. Three types of passive WEP attacks
802.11
A VPN to the office network
Brute force - statistical and dictionary
Arp replay
39. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
Ad-Hoc
RTS/CTS
Quality of Service
40. What best describes the Wi-Fi alliance?
Roaming
UNII
Interoperability testing organization
3
41. 3 types of antennas
HT fixed mode
Spoof an address
Plaintext
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
42. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
802.11i
SOHO brands that support WPS
AES = CCMP required
43. Collisions are detected through the use of....
Personal mode and Enterprise Mode
Captive portal
Interoperability testing organization
Acknowledgement frames
44. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
BSSID (Basic Service Set identifier)
Repeater
Automatically monitor the network for attacks
ERP-OFDM - DSSS
45. A service set identifier (SSID) has a maximum limit of how many characters?
Arp
32
Residential and Enterprise
Transmitter and receiver
46. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
FCC
25 MHz
Enter a username and password that will be central administered
Bridge mode
47. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
WPA 2.0 personal and WPS
Trojan/Rogue APs - Arp spoofing - DNS spoofing
802.11n
48. Name two absolute measures of RF power
HT Non member protection mode
Unencrypted
Watt and mW
Encryption
49. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Authentication
Obstacles
Passphrase
Bridge mode
50. High Throughput mode 1
HT Non member protection mode
Managed
Encryption
CTS attacks - Deauth attack - Association flood - Jamming