SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which if the following organizations is responsible for standards compliance?
MAC
802.11a
3
Wi-Fi Alliance
2. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Active scanning
MAC
Degradation
AP to AP
3. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Diffraction
SSID and Channel
SOHO brands that support WPS
4 channels
4. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Authenticate - associate
Personal mode and Enterprise Mode
Station (STA)
Security
5. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
WPA Enterprise -WEP -MAC filters
RTS/CTS
CCMP
6. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Interference from a neighboring access point RF denial-of-service (Dos) attack
Deauth
WEP
Transmitter and receiver
7. 802.11g LAN operates in what frequency range?
Extended Service Set (ESS)
Reflection
Wi-Fi Alliance
2.4-2.5GHz
8. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Two
Wavelength
Personal mode and Enterprise Mode
ERP protection
9. Wireless gateways come in two primary forms...
Unicast
Residential and Enterprise
Authentication
LTE
10. The length of a WEP key is typically ___ or ___
Monitor
64-bit - 128-bit
Station (STA)
OFDM
11. WiMAX 802.16 authentication is based on...
X.509 certificates on the subscriber side only.
CA - Collision avoidance
OFDM
Managed
12. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Point-to-point link
802.11b
Monitor
11
13. 802.11w can only be used in networks using_____
MAC
WPA/WPA2
6 -12 - and 24 Mbps
Wi-Fi Alliance
14. This sets the card to participate in an independent basic service set
Carefully plan a strategy using WEP and VLANs
WEP
Ad-Hoc
HT 20 MHz protection mode
15. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
WPA Enterprise -WEP -MAC filters
Bridge mode
1
LTE
16. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
SOHO brands that support WPS
Arp replay
Know the SSID and enter it manually
Ad-Hoc
17. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
HT 20 MHz protection mode
802.11r
Data rate increases
LTE
18. According to the 802.11a amendment - which data rates are mandatory?
Roaming
6 -12 - and 24 Mbps
Two
Carefully plan a strategy using WEP and VLANs
19. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
HT Non member protection mode
32
Workgroup Bridge mode.
802.11r
20. As a device moves away from an access point - what is true regarding dynamic rate switching?
Deauth
Trojan/Rogue APs
Number of users and software applications in use
Data rate increases
21. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Frequency
WPA Enterprise -WEP -MAC filters
Beacons - Probe request - Probe response - Association Request - Reassociation Request
22. Name two absolute measures of RF power
Watt and mW
Secure Layer 3 transmissions over a public network infrastructure
Dual radio APs
Wi-Fi Alliance
23. These are user configurable and present in only five 802.11 frame types...
Service sets
Beacons - Probe request - Probe response - Association Request - Reassociation Request
25 MHz
Fake auth
24. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
Encryption
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Height of an RF signal
25. Give two examples of WGB devices.
3
Quality of Service
FCC
Wireless Game adapters and Media Bridges
26. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
WPA2 -WEP
3
802.11b
SSID (service set identifier)
27. High throughput mode 2
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
HT 20 MHz protection mode
AP radio
WPA2 -WEP
28. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Brute force - statistical and dictionary
UNII
32 character maximum and is case sensitive
WPA 2.0 personal and WPS
29. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
Restricts access to authorized users
Carefully plan a strategy using WEP and VLANs
Monitor
30. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
22MHz wide
HT 20 MHz protection mode
Quality of Service
Passve Scanning
31. 802.11b is capable of which data rates?
Ad-Hoc
Height of an RF signal
Root mode
1 - 5.5 and 11 Mbps
32. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Watt and mW
Know the SSID and enter it manually
Independent
ERP protection
33. the amplitude of an RF signal is
SOHO brands that support WPS
Height of an RF signal
CTS attacks - Deauth attack - Association flood - Jamming
Management - control - data
34. 3 types of antennas
One or more
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
1 - 5.5 and 11 Mbps
Trojan/Rogue APs
35. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Wavelength
Beacons - Probe request - Probe response - Association Request - Reassociation Request
WPA 2.0 personal and WPS
Mesh network
36. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Other 802.11a devices
ARP spoofing
HT fixed mode
Management
37. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
3
FHSS
Authentication
38. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Frequency
WEP
One or more
Independent
39. What type of algorithm does WPA use
Independent
40 bit
TKIP - optional RC4
1
40. This is typically the 48-bit MAC address of the access point's radio card.
Active scanning
3
Obstacles
BSSID (Basic Service Set identifier)
41. The 802.11i amendment to the standard addresses which of the following technologies?
Security
802.11i
1
MAC
42. Point to Point links typically use which antenna types?
Three
Interference from a neighboring access point RF denial-of-service (Dos) attack
802.11i
Semi directional and Highly directional
43. Probe requests are used by clients as part of the ____ process
WPA2 -WEP
Active scanning
Encryption
Diffraction
44. What type of certification came from 802.11i
Restricts access to authorized users
UNII
1
WPA2
45. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Restricts access to authorized users
SSID and Channel
Passve Scanning
Workgroup Bridge mode.
46. Which function does RBAC provide?
HT fixed mode
802.11w
2304 bytes
Restricts access to authorized users
47. The security amendment to the IEEE 802.11 standard requires ____
X.509 certificates on the subscriber side only.
Secure Layer 3 transmissions over a public network infrastructure
TKIP - optional RC4
CCMP
48. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
Open system and Shared key
RTS/CTS
ARP spoofing
49. In bluetooth - one master may communicate with up to ___ slaves in a piconet
HT Non member protection mode
Security
7
Beacons - Probe request - Probe response - Association Request - Reassociation Request
50. This is a topology in which two or more APs are connected by a common distribution system.
TKIP - optional RC4
Extended Service Set (ESS)
WPA Enterprise -WEP -MAC filters
Independent