SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11 uses CSMA/...
Mismatched SSID
CA - Collision avoidance
22MHz wide
Mesh
2. 802.11w can only be used in networks using_____
WPA/WPA2
Walled Garden.
Enter a username and password that will be central administered
Unencrypted
3. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
0
RTS/CTS
Wi-Fi Alliance
Passphrase
4. 4 types of Denial of Service attacks
Encryption
CTS attacks - Deauth attack - Association flood - Jamming
Mismatched SSID
Single radio AP's
5. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
UNII
CA - Collision avoidance
Frequency
Mismatched SSID
6. What type of algorithm does WPA use
HT 20 MHz protection mode
Acknowledgement frames
TKIP - optional RC4
1
7. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Access point
4 channels
ISM
40 bit
8. Aireplay-ng -0
802.11n
Deauth
Reflection
OFDM
9. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Passive scan
Passphrase
Walled Garden.
Beacons - Probe request - Probe response - Association Request - Reassociation Request
10. 802.11a uses which spread spectrum technology?
Access point
Management - control - data
Root mode
OFDM
11. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Extended Service Set (ESS)
SSID (service set identifier)
Root mode
Enter a username and password that will be central administered
12. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Two
WPA2 -WEP
ISM
Station (STA)
13. High Throughput mode 1
HT Non member protection mode
802.11r
Access point
Mismatched SSID
14. This is a topology in which two or more APs are connected by a common distribution system.
HT 20 MHz protection mode
Access point
Extended Service Set (ESS)
Dual radio APs
15. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
802.11b HR/DSSS and 802.11 DSSS
Encryption
Repeater
Dual radio APs
16. What best describes the Wi-Fi alliance?
OFDM
ERP-OFDM - DSSS
802.11w
Interoperability testing organization
17. Probe requests are used by clients as part of the ____ process
Passve Scanning
Active scanning
Spoof an address
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
18. Give two examples of WGB devices.
X.509 certificates on the subscriber side only.
Wireless Game adapters and Media Bridges
Deauth
Arp replay
19. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Repeater
Captive portal
SSID (service set identifier)
Access point
20. This type of authentication is essentially 'Null authentication'
Automatically monitor the network for attacks
Open system
Management
4 channels
21. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Arp
Residential and Enterprise
Refraction
Active scanning
22. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
ERP-OFDM - DSSS
3
HT Non member protection mode
23. What type of wireless network device is PIN-based security most commonly used with
AES = CCMP required
Dynamic Rate switching
SOHO brands that support WPS
Secure Layer 3 transmissions over a public network infrastructure
24. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Three
Extended Service Set (ESS)
Spoof an address
UNII
25. What organization is responsible for unlicensed frequency band regulations in the United States?
Passphrase
FCC
Transmitter and receiver
3
26. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Workgroup Bridge mode.
A VPN to the office network
Refraction
Personal mode and Enterprise Mode
27. Bridge mode will not allow client associations and is ______ only
Unencrypted
FCC
Quality of Service
AP to AP
28. Which security feature provides the strongest security for a home-based wireless network?
Management
Workgroup Bridge mode.
Reflection
Passphrase
29. The radio card can operate in one of up to six possible modes of operation...
Height of an RF signal
WPA Enterprise -WEP -MAC filters
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Semi directional and Highly directional
30. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
Number of users and software applications in use
CCMP
Root mode
31. Bluetooth uses a radio technology called
IPSec
Number of users and software applications in use
Fakeauth
FHSS
32. an 802.11b 2.4GHz channel is how wide in MHz?
Data rate increases
22MHz wide
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Access point
33. The length of a WEP key is typically ___ or ___
AP radio
Height of an RF signal
6 -12 - and 24 Mbps
64-bit - 128-bit
34. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11
802.11i
Refraction
ERP protection
35. Name two absolute measures of RF power
Wi-Fi Alliance
Watt and mW
RTS/CTS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
36. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Authenticate - associate
7
Mesh network
22MHz wide
37. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
38. High Throughput mode 0
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Active mode
Three
Greenfield mode
39. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Transmitter and receiver
Wi-Fi Alliance
64-bit - 128-bit
A VPN to the office network
40. Beacons allow client devices to ____ for available LANS
Wavelength
HT 20 MHz protection mode
Station (STA)
Passive scan
41. The security amendment to the IEEE 802.11 standard requires ____
Managed
WPA2
CCMP
HT Non member protection mode
42. 802.11 frames have a maximum 'upper-layer' payload of...
Captive portal
2304 bytes
Mesh network
Walled Garden.
43. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
LTE
4 channels
Monitor
Brute force - statistical and dictionary
44. A newly configured wireless intrusion prevention system will___
1 - 5.5 and 11 Mbps
Brute force - statistical and dictionary
Automatically monitor the network for attacks
Plaintext
45. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
Obstacles
Unencrypted
Open system
46. What is the gain of an antenna measured in
DBi
Indoor and outdoor
SSID (service set identifier)
Interference from a neighboring access point RF denial-of-service (Dos) attack
47. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Fake auth
Three
Wireless gateways
AP radio
48. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Encryption
Fake auth
802.11a
Open system and Shared key
49. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Two
Repeater
Antenna diversity
50. When a wireless LAN device listens for beacon frames - it is participating in which phase?
MAC
2304 bytes
Passve Scanning
WPA2