Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






2. When a wireless LAN device listens for beacon frames - it is participating in which phase?






3. In repeater mode - the repeater device connects to a normal '___ mode'






4. A service set identifier (SSID) has a maximum limit of how many characters?






5. Maximum length of data (Frame body) is 2304 when ____ is not in use






6. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






7. The open system authentication process uses how many frames?






8. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






9. The security amendment to the IEEE 802.11 standard requires ____






10. Name two absolute measures of RF power






11. 4 types of Denial of Service attacks






12. According to the 802.11a amendment - which data rates are mandatory?






13. The capacity of an access point is dependent upon which factors?






14. Collisions are detected through the use of....






15. Which process is a VPN solution intended to provide for users connection to a network






16. Beacons allow client devices to ____ for available LANS






17. Aireplay-ng -1






18. Which data encryption.authentication method is identified in the IEEE 802.11 standard






19. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






20. 3 types of frames






21. The Access point can operate in a variety of modes...






22. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






23. WI-Fi Protected Setup was designed for which of the following wireless applications?






24. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






25. Which items are unique to a service set identifier






26. the amplitude of an RF signal is






27. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






28. A weakness with MAC filtering is that it allows an intruder to ____






29. WiMAX 802.16 authentication is based on...






30. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






31. 802.11a uses which spread spectrum technology?






32. 802.11 uses CSMA/...






33. This is typically the 48-bit MAC address of the access point's radio card.






34. Name two relative measures of power






35. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






36. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






37. Which function does RBAC provide?






38. WPA was developed as an interim solution for which amendment to the 802.11 standards?






39. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






40. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






41. Name 3 channels considered non overlapping in the 2.4GHZ band






42. High throughput mode 3






43. Give two examples of WGB devices.






44. A newly configured wireless intrusion prevention system will___






45. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






46. A basic service set identifier (BSSID) is the MAC address of the ____






47. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






48. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






49. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






50. When an RF signal bounces off a smooth non absorptive surface - the behavior is