SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Collisions are detected through the use of....
Deauth
Authenticate - associate
Passive scan
Acknowledgement frames
2. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Addresses wireless Quality of Service
Trojan/Rogue APs
Workgroup Bridge mode.
802.11r
3. Which items are unique to a service set identifier
Indoor and outdoor
802.11a
WEP
32 character maximum and is case sensitive
4. This is a topology in which two or more APs are connected by a common distribution system.
Wireless gateways
Extended Service Set (ESS)
Indoor and outdoor
Diffraction
5. High Throughput mode 1
HT Non member protection mode
Fakeauth
Watt and mW
Repeater
6. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
802.11g
IPSec
3
7. The process in which a wireless LAN clients connection moves from one access point to another is called ______
RTS/CTS
Roaming
Workgroup Bridge mode.
Antenna diversity
8. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Antenna diversity
WPA2
TKIP - optional RC4
Interference from a neighboring access point RF denial-of-service (Dos) attack
9. High throughput mode 3
A VPN to the office network
FCC
Quality of Service
HT fixed mode
10. What type of algorithm does WPA use
TKIP - optional RC4
Extended Service Set (ESS)
CA - Collision avoidance
UNII
11. Wireless gateways come in two primary forms...
2304 bytes
Fake auth
Residential and Enterprise
Dictionary
12. These are user configurable and present in only five 802.11 frame types...
4 channels
Root mode
HT fixed mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
13. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Data rate increases
IPSec
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
One or more
14. An independent basic service set (IBSS) consists of how many access points?
Roaming
0
CA - Collision avoidance
Greenfield mode
15. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
LTE
WPA 2.0 personal and WPS
Monitor
HT Non member protection mode
16. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Addresses wireless Quality of Service
1 -6 -11
Acknowledgement frames
17. A ______________ does not always use an omnidirectional antenna
Point-to-point link
DBi
Height of an RF signal
ERP protection
18. A brute force attack is limited to breaking___ WEP keys
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
40 bit
Client
Automatically monitor the network for attacks
19. Aireplay-ng -3
Enter a username and password that will be central administered
Arp
Station (STA)
Unencrypted
20. The 802.11i amendment to the standard addresses which of the following technologies?
Personal mode and Enterprise Mode
WPA2 -WEP
Security
802.11w
21. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
DB and dBi
RTS/CTS
Root mode
22. 3 types of antennas
Antenna diversity
Unencrypted
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Root mode
23. What is regarded in 802.11e?
Restricts access to authorized users
Addresses wireless Quality of Service
Repeater
Walled Garden.
24. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Greenfield mode
Antenna diversity
ISM
802.11i
25. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Three
Plaintext
Single radio AP's
Frequency
26. Which if the following organizations is responsible for standards compliance?
Deauth
RTS/CTS
Access point
Wi-Fi Alliance
27. In repeater mode - the repeater device connects to a normal '___ mode'
MAC
Plaintext
Root mode
Mesh network
28. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
WPA2
Fakeauth
Watt and mW
29. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
3
Security
Plaintext
30. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Refraction
Height of an RF signal
Carefully plan a strategy using WEP and VLANs
Captive portal
31. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
802.11a
Fake auth
Monitor
Wavelength
32. 802.11w can only be used in networks using_____
Single radio AP's
Antenna diversity
WPA/WPA2
WPA2 -WEP
33. A weakness with MAC filtering is that it allows an intruder to ____
Dictionary
SOHO brands that support WPS
Spoof an address
Mesh network
34. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Frequency
Monitor
Authenticate - associate
Managed
35. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
LTE
11
Refraction
Indoor and outdoor
36. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Unencrypted
Fakeauth
Open system and Shared key
Other 802.11a devices
37. What organization is responsible for unlicensed frequency band regulations in the United States?
Basic Service Set (BSS)
FCC
AP radio
Arp replay
38. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. According to the 802.11a amendment - which data rates are mandatory?
6 -12 - and 24 Mbps
Three
RC4
Mismatched SSID
40. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
Roaming
Passive scan
ERP-OFDM - DSSS
41. an 802.11b 2.4GHz channel is how wide in MHz?
22MHz wide
2304 bytes
ERP-OFDM - DSSS
Refraction
42. High throughput mode 2
HT 20 MHz protection mode
Wi-Fi Alliance
Master
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
43. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
1
11
FCC
44. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Passve Scanning
Access point
Captive portal
Antenna diversity
45. The capacity of an access point is dependent upon which factors?
32 character maximum and is case sensitive
Transmitter and receiver
Workgroup Bridge mode.
Number of users and software applications in use
46. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Passive scan
WPA Enterprise -WEP -MAC filters
Security
Station (STA)
47. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Single radio AP's
X.509 certificates on the subscriber side only.
Root mode
48. What two devices use RF to communicate
Data rate increases
Transmitter and receiver
7
CTS attacks - Deauth attack - Association flood - Jamming
49. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
0
Open system
802.11w
50. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Wireless gateways
11
Dynamic Rate switching
802.11b