Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is typically the 48-bit MAC address of the access point's radio card.






2. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






3. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






4. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






5. Name 3 channels considered non overlapping in the 2.4GHZ band






6. What type of wireless network device is PIN-based security most commonly used with






7. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






8. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






9. Name two absolute measures of RF power






10. The Access point can operate in a variety of modes...






11. 3 types of antennas






12. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






13. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






14. Which process is a VPN solution intended to provide for users connection to a network






15. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






16. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






17. Probe requests are used by clients as part of the ____ process






18. What algorithm does WEP use






19. What best describes the Wi-Fi alliance?






20. The radio card can operate in one of up to six possible modes of operation...






21. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






22. Which security methods do 802.11g access points support?






23. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






24. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






25. In order to set up an ad hoc network a user must know which two parameters?






26. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






27. Bluetooth uses a radio technology called






28. As a device moves away from an access point - what is true regarding dynamic rate switching?






29. What kind of Algorithm does WPA2 use?






30. Bridge mode will not allow client associations and is ______ only






31. WI-Fi Protected Setup was designed for which of the following wireless applications?






32. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






33. The association process happens after which phase?






34. A ______________ does not always use an omnidirectional antenna






35. The capacity of an access point is dependent upon which factors?






36. an 802.11b 2.4GHz channel is how wide in MHz?






37. Layer 2 Tunneling Protocol commonly uses which encryption method?






38. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






39. What item has an effect on RF line of site?






40. Name two relative measures of power






41. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






42. A newly configured wireless intrusion prevention system will___






43. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






44. High Throughput mode 1






45. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






46. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






47. A basic service set (BSS) consists of how many access points






48. What type of algorithm does WPA use






49. The ___ acts as a hub for the WLAN; wireless frame pass through this device






50. The 802.11i amendment to the standard addresses which of the following technologies?