SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
SOHO brands that support WPS
14
ARP spoofing
2. 3 types of antennas
Management - control - data
ISM
Monitor
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
3. What item has an effect on RF line of site?
Interoperability testing organization
Obstacles
TKIP - optional RC4
11
4. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Dual radio APs
802.11b
Security
Watt and mW
5. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
14
Dynamic Rate switching
AP radio
6. A basic service set identifier (BSSID) is the MAC address of the ____
Mesh network
Arp replay
AP radio
Single radio AP's
7. 802.11 uses CSMA/...
Semi directional and Highly directional
CA - Collision avoidance
Enter a username and password that will be central administered
UNII
8. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Transmitter and receiver
CA - Collision avoidance
Degradation
Quality of Service
9. This is typically the 48-bit MAC address of the access point's radio card.
802.11b
BSSID (Basic Service Set identifier)
Other 802.11a devices
Watt and mW
10. The association process happens after which phase?
Authentication
Restricts access to authorized users
802.11b HR/DSSS and 802.11 DSSS
11
11. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Dynamic Rate switching
802.11w
Passve Scanning
12. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Extended Service Set (ESS)
Obstacles
Unicast
Basic Service Set (BSS)
13. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11n
Single radio AP's
Refraction
Antenna diversity
14. What type of certification came from 802.11i
Repeater
Encryption
WPA2
DB and dBi
15. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Wi-Fi Alliance
Frequency
Extended Service Set (ESS)
Addresses wireless Quality of Service
16. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
RTS/CTS
ISM
Arp replay
ARP spoofing
17. An independent basic service set (IBSS) consists of how many access points?
Amplitude and phase
0
Authenticate - associate
Mesh network
18. This type of authentication is essentially 'Null authentication'
802.11i
Open system
Roaming
Dictionary
19. Maximum length of data (Frame body) is 2304 when ____ is not in use
Obstacles
SSID and Channel
Open system and Shared key
Encryption
20. What best describes the Wi-Fi alliance?
Interoperability testing organization
ARP spoofing
Obstacles
Master
21. Two characteristics of signals are
WPA 2.0 personal and WPS
CCMP
Amplitude and phase
Brute force - statistical and dictionary
22. Which security feature provides the strongest security for a home-based wireless network?
Service sets
802.11n
Passphrase
Interference from a neighboring access point RF denial-of-service (Dos) attack
23. A service set identifier (SSID) has a maximum limit of how many characters?
Encryption
32
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
BSSID (Basic Service Set identifier)
24. Three types of passive WEP attacks
Active scanning
Other 802.11a devices
MAC
Brute force - statistical and dictionary
25. The security amendment to the IEEE 802.11 standard requires ____
CCMP
Number of users and software applications in use
Amplitude and phase
32
26. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
WPA2
Management - control - data
Refraction
Plaintext
27. Which if the following organizations is responsible for standards compliance?
Trojan/Rogue APs - Arp spoofing - DNS spoofing
WPA 2.0 personal and WPS
802.11g
Wi-Fi Alliance
28. High throughput mode 2
Passve Scanning
Open system and Shared key
Access point
HT 20 MHz protection mode
29. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wireless Game adapters and Media Bridges
Wi-Fi Alliance
Know the SSID and enter it manually
Wavelength
30. Which items are unique to a service set identifier
Antenna diversity
OFDM
32 character maximum and is case sensitive
Dual radio APs
31. Both ___ and ___ are wireless LAN security methods that support shared key security.
WEP
DB and dBi
WPA2 -WEP
802.11
32. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Degradation
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Dictionary
Arp replay
33. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
40 bit
802.11a
Frequency
Small Office/Home Office Organizations (SOHO)
34. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
Arp replay
Encryption
Dynamic Rate switching
35. Management frames are sent in....
Master
Plaintext
802.11r
Management
36. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Brute force - statistical and dictionary
A VPN to the office network
4 channels
Repeater
37. Aireplay-ng -0
Deauth
Passve Scanning
FHSS
Trojan/Rogue APs - Arp spoofing - DNS spoofing
38. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Semi directional and Highly directional
Indoor and outdoor
39. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
40. The Access point can operate in a variety of modes...
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Mesh network
Access point
Interoperability testing organization
41. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Monitor
Passphrase
Addresses wireless Quality of Service
42. In this mode a station can act as a relay or WLAN range extender
7
Repeater
Quality of Service
Point-to-point link
43. A pre-shared key mode may be vulnerable to a ____ attack
Unicast
Dictionary
Watt and mW
1 - 5.5 and 11 Mbps
44. Probe requests are used by clients as part of the ____ process
Service sets
Arp
WPA2
Active scanning
45. High Throughput mode 0
32
Greenfield mode
3
Monitor
46. Which security methods do 802.11g access points support?
64-bit - 128-bit
Secure Layer 3 transmissions over a public network infrastructure
WPA Enterprise -WEP -MAC filters
Fake auth
47. When RF passes or bends around an obstacle such as a building or column - the behavior is
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
BSSID (Basic Service Set identifier)
32
Diffraction
48. ___ are used to describe the basic components and topology of a WLAN
Client
Service sets
RTS/CTS
Two
49. Aireplay-ng -1
Fakeauth
Mesh network
802.11w
Service sets
50. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Trojan/Rogue APs
Antenna diversity
UNII
FCC