SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In this mode a station can act as a relay or WLAN range extender
Repeater
ERP protection
AP to AP
Semi directional and Highly directional
2. What type of certification came from 802.11i
64-bit - 128-bit
WPA2
22MHz wide
Extended Service Set (ESS)
3. What organization is responsible for unlicensed frequency band regulations in the United States?
64-bit - 128-bit
FCC
Roaming
Data rate increases
4. According to the 802.11a amendment - which data rates are mandatory?
3
6 -12 - and 24 Mbps
Security
Obstacles
5. 802.11a uses which spread spectrum technology?
Wi-Fi Alliance
Basic Service Set (BSS)
OFDM
802.11a
6. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
AP radio
Trojan/Rogue APs
Authentication
4 channels
7. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
32 character maximum and is case sensitive
Other 802.11a devices
Dictionary
LTE
8. A basic service set (BSS) consists of how many access points
Obstacles
1
Other 802.11a devices
PIN
9. This is the default mode that sets the card as a client that could then connect to an AP
Indoor and outdoor
Security
Managed
802.11n
10. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
X.509 certificates on the subscriber side only.
OFDM
Wireless gateways
11. High throughput mode 2
802.11a
HT 20 MHz protection mode
1 - 5.5 and 11 Mbps
WPA/WPA2
12. Three types of passive WEP attacks
WPA 2.0 personal and WPS
4 channels
Brute force - statistical and dictionary
A VPN to the office network
13. This is typically the 48-bit MAC address of the access point's radio card.
Deauth
Diffraction
BSSID (Basic Service Set identifier)
SOHO brands that support WPS
14. In order to set up an ad hoc network a user must know which two parameters?
Unencrypted
Automatically monitor the network for attacks
SSID and Channel
Monitor
15. The process in which a wireless LAN clients connection moves from one access point to another is called ______
802.11i
25 MHz
Security
Roaming
16. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
802.11r
ISM
64-bit - 128-bit
Monitor
17. Layer 2 Tunneling Protocol commonly uses which encryption method?
WPA2
IPSec
802.11w
UNII
18. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
CTS attacks - Deauth attack - Association flood - Jamming
Quality of Service
Reflection
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
19. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
RC4
HT 20 MHz protection mode
Master
Refraction
20. 3 types of antennas
Quality of Service
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
WPA Enterprise -WEP -MAC filters
40 bit
21. ___ are used to describe the basic components and topology of a WLAN
1 -6 -11
Data rate increases
Service sets
2.4-2.5GHz
22. High throughput mode 3
HT fixed mode
HT Non member protection mode
Indoor and outdoor
14
23. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
802.11
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
SSID (service set identifier)
Authenticate - associate
24. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
ISM
Active scanning
Fake auth
1 - 5.5 and 11 Mbps
25. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Repeater
One or more
802.11n
26. Probe requests are used by clients as part of the ____ process
Active scanning
Dual radio APs
Obstacles
Semi directional and Highly directional
27. WiMAX 802.16 authentication is based on...
Other 802.11a devices
2.4-2.5GHz
Antenna diversity
X.509 certificates on the subscriber side only.
28. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Point-to-point link
Captive portal
Obstacles
Mesh network
29. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
802.11r
Plaintext
7
30. Name two absolute measures of RF power
ISM
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Arp
Watt and mW
31. What best describes the Wi-Fi alliance?
Interoperability testing organization
Arp replay
Encryption
Authentication
32. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
CCMP
Carefully plan a strategy using WEP and VLANs
Wireless gateways
802.11n
33. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
SSID and Channel
Obstacles
Passphrase
Repeater
34. This sets the card to participate in an independent basic service set
Ad-Hoc
Wi-Fi Alliance
CA - Collision avoidance
64-bit - 128-bit
35. The open system authentication process uses how many frames?
Two
Fake auth
Captive portal
802.11
36. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Frequency
Captive portal
22MHz wide
802.11
37. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
WPA 2.0 personal and WPS
802.11w
Wavelength
Management
38. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
Encryption
Wireless gateways
PIN
39. WI-Fi Protected Setup was designed for which of the following wireless applications?
Two
Small Office/Home Office Organizations (SOHO)
MAC
One or more
40. Two authentication types defined in the 802.11 standard
Open system and Shared key
BSSID (Basic Service Set identifier)
Bridge mode
802.11n
41. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
14
TKIP - optional RC4
42. Which data encryption.authentication method is identified in the IEEE 802.11 standard
802.11r
40 bit
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
WEP
43. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
802.11b
Residential and Enterprise
Roaming
WPA 2.0 personal and WPS
44. 4 types of Denial of Service attacks
Arp replay
Repeater
Open system
CTS attacks - Deauth attack - Association flood - Jamming
45. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
46. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
4 channels
ARP spoofing
UNII
802.11g
47. Bluetooth uses a radio technology called
RTS/CTS
Plaintext
FHSS
RC4
48. In this mode - the card acts as a normal access point
2304 bytes
Amplitude and phase
Master
Access point
49. An Ack is expected for every____ frame transmitted
HT fixed mode
IPSec
802.11w
Unicast
50. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
AP to AP
Antenna diversity
LTE