Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






2. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






3. What type of wireless network device is PIN-based security most commonly used with






4. This is the default mode that sets the card as a client that could then connect to an AP






5. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






6. An Ack is expected for every____ frame transmitted






7. What type of certification came from 802.11i






8. The open system authentication process uses how many frames?






9. Give two examples of WGB devices.






10. In this mode - the card acts as a normal access point






11. 802.11w can only be used in networks using_____






12. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






13. As a device moves away from an access point - what is true regarding dynamic rate switching?






14. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






15. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






16. This is typically the 48-bit MAC address of the access point's radio card.






17. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






18. WiMAX 802.16 authentication is based on...






19. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






20. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






21. the amplitude of an RF signal is






22. Wireless gateways come in two primary forms...






23. What is regarded in 802.11e?






24. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






25. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






26. Aireplay-ng -3






27. This sets the card to participate in an independent basic service set






28. This type of authentication is essentially 'Null authentication'






29. What is the gain of an antenna measured in






30. Which items are unique to a service set identifier






31. Layer 2 Tunneling Protocol commonly uses which encryption method?






32. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






33. ____ is also known as the Protected management frame standard






34. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






35. What kind of Algorithm does WPA2 use?






36. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






37. A station can act as a routing node in a wireless mesh network






38. an 802.11b 2.4GHz channel is how wide in MHz?






39. High throughput mode 2






40. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






41. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






42. A ______________ does not always use an omnidirectional antenna






43. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






44. What two devices use RF to communicate






45. The Layer 2 frame will be...






46. Two characteristics of signals are






47. Bluetooth uses a radio technology called






48. Probe requests are used by clients as part of the ____ process






49. The process in which a wireless LAN clients connection moves from one access point to another is called ______






50. 4 types of Denial of Service attacks