Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -1






2. What best describes the Wi-Fi alliance?






3. The capacity of an access point is dependent upon which factors?






4. What is the gain of an antenna measured in






5. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


6. Which security feature provides the strongest security for a home-based wireless network?






7. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






8. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






9. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






10. In order to set up an ad hoc network a user must know which two parameters?






11. Collisions are detected through the use of....






12. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






13. When an RF signal bounces off a smooth non absorptive surface - the behavior is






14. A brute force attack is limited to breaking___ WEP keys






15. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






16. This type of authentication is essentially 'Null authentication'






17. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






18. A basic service set (BSS) consists of how many access points






19. an 802.11b 2.4GHz channel is how wide in MHz?






20. Wireless gateways come in two primary forms...






21. Which if the following organizations is responsible for standards compliance?






22. Management frames are sent in....






23. High Throughput mode 1






24. A ______________ does not always use an omnidirectional antenna






25. the amplitude of an RF signal is






26. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






27. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






28. High throughput mode 2






29. Both ___ and ___ are wireless LAN security methods that support shared key security.






30. Three types of passive WEP attacks






31. The Access point can operate in a variety of modes...






32. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






33. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






34. 3 types of antennas






35. Which function does RBAC provide?






36. The 802.11i amendment to the standard addresses which of the following technologies?






37. Which items are unique to a service set identifier






38. 802.11a uses which spread spectrum technology?






39. 4 types of Denial of Service attacks






40. A basic service set identifier (BSSID) is the MAC address of the ____






41. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






42. What kind of Algorithm does WPA2 use?






43. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






44. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






45. The Layer 2 frame will be...






46. This is typically the 48-bit MAC address of the access point's radio card.






47. Which security methods do 802.11g access points support?






48. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






49. WPA was developed as an interim solution for which amendment to the 802.11 standards?






50. Layer 2 Tunneling Protocol commonly uses which encryption method?