SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two characteristics of signals are
Spoof an address
Amplitude and phase
32
Other 802.11a devices
2. ___ are used to describe the basic components and topology of a WLAN
Service sets
Degradation
3
RTS/CTS
3. A weakness with MAC filtering is that it allows an intruder to ____
Dual radio APs
Wireless gateways
Spoof an address
11
4. In bluetooth - one master may communicate with up to ___ slaves in a piconet
7
BSSID (Basic Service Set identifier)
Data rate increases
Small Office/Home Office Organizations (SOHO)
5. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Security
11
Watt and mW
Access point
6. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Restricts access to authorized users
Unicast
CTS attacks - Deauth attack - Association flood - Jamming
7. What best describes the Wi-Fi alliance?
Interoperability testing organization
802.11n
IPSec
Passve Scanning
8. Typically a point-to-multipoint link consists of ____ connections
Three
Residential and Enterprise
Trojan/Rogue APs
Two
9. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
BSSID (Basic Service Set identifier)
Know the SSID and enter it manually
Small Office/Home Office Organizations (SOHO)
10. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Mesh network
Passve Scanning
FCC
Repeater
11. Aireplay-ng -1
Service sets
Fakeauth
Refraction
Open system
12. the amplitude of an RF signal is
Active scanning
Trojan/Rogue APs
Height of an RF signal
40 bit
13. 802.11 uses CSMA/...
Carefully plan a strategy using WEP and VLANs
2304 bytes
Mesh network
CA - Collision avoidance
14. The radio card can operate in one of up to six possible modes of operation...
Mesh network
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Extended Service Set (ESS)
FCC
15. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Managed
WPA Enterprise -WEP -MAC filters
802.11
802.11a
16. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
HT Non member protection mode
Antenna diversity
ISM
Wireless Game adapters and Media Bridges
17. Layer 2 Tunneling Protocol commonly uses which encryption method?
Watt and mW
WPA2 -WEP
IPSec
DB and dBi
18. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
Repeater
Service sets
Basic Service Set (BSS)
19. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
Plaintext
25 MHz
802.11b HR/DSSS and 802.11 DSSS
20. According to the 802.11a amendment - which data rates are mandatory?
Spoof an address
6 -12 - and 24 Mbps
2304 bytes
Extended Service Set (ESS)
21. In this mode a station can act as a relay or WLAN range extender
802.11n
Authentication
Mesh
Repeater
22. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Authenticate - associate
FHSS
Transmitter and receiver
23. an 802.11b 2.4GHz channel is how wide in MHz?
802.11b
RC4
WPA2
22MHz wide
24. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Personal mode and Enterprise Mode
1
HT 20 MHz protection mode
Carefully plan a strategy using WEP and VLANs
25. What type of certification came from 802.11i
WPA2
Monitor
Transmitter and receiver
SSID and Channel
26. Name two relative measures of power
DBi
DB and dBi
Data rate increases
Semi directional and Highly directional
27. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
802.11i
Greenfield mode
PIN
Roaming
28. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
OFDM
Frequency
Security
ARP spoofing
29. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
BSSID (Basic Service Set identifier)
Authenticate - associate
Passve Scanning
30. This sets the card to participate in an independent basic service set
Mesh
PIN
Ad-Hoc
Single radio AP's
31. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
40 bit
Station (STA)
Wavelength
32. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Secure Layer 3 transmissions over a public network infrastructure
3
LTE
Walled Garden.
33. As a device moves away from an access point - what is true regarding dynamic rate switching?
Acknowledgement frames
22MHz wide
Data rate increases
LTE
34. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Obstacles
FCC
ISM
Wireless gateways
35. Bridge mode will not allow client associations and is ______ only
HT 20 MHz protection mode
AP to AP
25 MHz
Restricts access to authorized users
36. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Degradation
Wireless gateways
A VPN to the office network
ISM
37. ____ is also known as the Protected management frame standard
Three
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Passphrase
802.11w
38. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Access point
WEP
Spoof an address
64-bit - 128-bit
39. 802.11a uses which spread spectrum technology?
OFDM
Obstacles
Residential and Enterprise
Wireless gateways
40. The 802.11g standard uses which two speed spectrum technologies.
MAC
ERP-OFDM - DSSS
1
802.11r
41. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
CA - Collision avoidance
Interoperability testing organization
Arp replay
Carefully plan a strategy using WEP and VLANs
42. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Amplitude and phase
Security
Basic Service Set (BSS)
FHSS
43. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Mesh network
BSSID (Basic Service Set identifier)
Authentication
44. Which items are unique to a service set identifier
32 character maximum and is case sensitive
HT 20 MHz protection mode
802.11
Management - control - data
45. A station can act as a routing node in a wireless mesh network
Mismatched SSID
A VPN to the office network
Mesh
Service sets
46. Collisions are detected through the use of....
MAC
Acknowledgement frames
Arp
SSID (service set identifier)
47. The Access point can operate in a variety of modes...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Other 802.11a devices
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
SSID (service set identifier)
48. An Ack is expected for every____ frame transmitted
32
HT fixed mode
Unicast
Active scanning
49. Name 3 channels considered non overlapping in the 2.4GHZ band
IPSec
64-bit - 128-bit
1 -6 -11
Enter a username and password that will be central administered
50. Management frames are sent in....
Watt and mW
Wireless Game adapters and Media Bridges
Extended Service Set (ESS)
Plaintext