SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Carefully plan a strategy using WEP and VLANs
Mismatched SSID
Other 802.11a devices
Passphrase
2. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Wireless Game adapters and Media Bridges
Client
Data rate increases
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
3. Probe requests are used by clients as part of the ____ process
ARP spoofing
32 character maximum and is case sensitive
Managed
Active scanning
4. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
802.11r
Personal mode and Enterprise Mode
Roaming
Dictionary
5. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Security
WEP
Monitor
ISM
6. Which security feature provides the strongest security for a home-based wireless network?
Obstacles
Passve Scanning
Walled Garden.
Passphrase
7. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Spoof an address
Authentication
802.11r
8. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
ISM
1 -6 -11
Enter a username and password that will be central administered
Management
9. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
Antenna diversity
Greenfield mode
Watt and mW
10. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passphrase
Fake auth
Station (STA)
Passve Scanning
11. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Enter a username and password that will be central administered
Antenna diversity
Managed
802.11r
12. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
13. An Ack is expected for every____ frame transmitted
Authenticate - associate
Amplitude and phase
Unicast
Spoof an address
14. WI-Fi Protected Setup was designed for which of the following wireless applications?
Small Office/Home Office Organizations (SOHO)
Dictionary
AP radio
802.11r
15. What type of algorithm does WPA use
Ad-Hoc
TKIP - optional RC4
Height of an RF signal
Active mode
16. This is a topology in which two or more APs are connected by a common distribution system.
Captive portal
Management
Extended Service Set (ESS)
Residential and Enterprise
17. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Semi directional and Highly directional
Wireless gateways
BSSID (Basic Service Set identifier)
Indoor and outdoor
18. The open system authentication process uses how many frames?
Addresses wireless Quality of Service
Two
Access point
Mismatched SSID
19. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
CTS attacks - Deauth attack - Association flood - Jamming
Small Office/Home Office Organizations (SOHO)
Passve Scanning
20. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Master
Fake auth
Passphrase
PIN
21. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
ERP-OFDM - DSSS
25 MHz
Passphrase
Quality of Service
22. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Refraction
Mesh network
Active mode
802.11i
23. 802.11g LAN operates in what frequency range?
Access point
Other 802.11a devices
2.4-2.5GHz
Greenfield mode
24. High Throughput mode 1
Reflection
ERP-OFDM - DSSS
Diffraction
HT Non member protection mode
25. In this mode a station can act as a relay or WLAN range extender
Walled Garden.
Mismatched SSID
Access point
Repeater
26. The length of a WEP key is typically ___ or ___
Three
64-bit - 128-bit
802.11i
Managed
27. A ______________ does not always use an omnidirectional antenna
Encryption
Point-to-point link
802.11
Passphrase
28. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Know the SSID and enter it manually
WPA2
Authentication
Passve Scanning
29. The radio card can operate in one of up to six possible modes of operation...
HT Non member protection mode
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Height of an RF signal
Master
30. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
FHSS
Bridge mode
PIN
31. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Refraction
Arp replay
Security
2304 bytes
32. A newly configured wireless intrusion prevention system will___
Quality of Service
Three
Automatically monitor the network for attacks
Access point
33. An independent basic service set (IBSS) consists of how many access points?
0
Residential and Enterprise
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Access point
34. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Fake auth
Indoor and outdoor
One or more
Roaming
35. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
7
WPA 2.0 personal and WPS
Two
36. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Captive portal
A VPN to the office network
2.4-2.5GHz
3
37. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
6 -12 - and 24 Mbps
Antenna diversity
MAC
Mesh network
38. Bridge mode will not allow client associations and is ______ only
14
Wireless Game adapters and Media Bridges
Secure Layer 3 transmissions over a public network infrastructure
AP to AP
39. Which items are unique to a service set identifier
2304 bytes
SOHO brands that support WPS
32 character maximum and is case sensitive
Active mode
40. High throughput mode 3
RTS/CTS
HT fixed mode
802.11
A VPN to the office network
41. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Mesh
1 -6 -11
Unencrypted
Interference from a neighboring access point RF denial-of-service (Dos) attack
42. 4 types of Denial of Service attacks
Open system and Shared key
Mesh
CTS attacks - Deauth attack - Association flood - Jamming
Fake auth
43. What is the gain of an antenna measured in
Bridge mode
Ad-Hoc
Active scanning
DBi
44. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
A VPN to the office network
Management
Dynamic Rate switching
45. Typically a point-to-multipoint link consists of ____ connections
Encryption
ARP spoofing
Three
802.11b HR/DSSS and 802.11 DSSS
46. What two devices use RF to communicate
Wi-Fi Alliance
Transmitter and receiver
WPA2 -WEP
Authenticate - associate
47. WiMAX 802.16 authentication is based on...
PIN
X.509 certificates on the subscriber side only.
Extended Service Set (ESS)
OFDM
48. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
X.509 certificates on the subscriber side only.
7
Walled Garden.
49. The security amendment to the IEEE 802.11 standard requires ____
ISM
Independent
CCMP
DBi
50. A service set identifier (SSID) has a maximum limit of how many characters?
AP radio
Managed
32
Management - control - data