SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
CTS attacks - Deauth attack - Association flood - Jamming
SSID (service set identifier)
2304 bytes
Managed
2. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
AP to AP
Point-to-point link
IPSec
3. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
802.11a
AES = CCMP required
64-bit - 128-bit
Mismatched SSID
4. WiMAX 802.16 authentication is based on...
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Root mode
Watt and mW
X.509 certificates on the subscriber side only.
5. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Management
Root mode
Reflection
CA - Collision avoidance
6. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
802.11i
AP radio
Master
7. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
32 character maximum and is case sensitive
Security
802.11b HR/DSSS and 802.11 DSSS
40 bit
8. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
9. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Brute force - statistical and dictionary
Indoor and outdoor
25 MHz
Other 802.11a devices
10. High throughput mode 3
HT fixed mode
Root mode
Roaming
CCMP
11. Which function does RBAC provide?
7
2304 bytes
Enter a username and password that will be central administered
Restricts access to authorized users
12. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
X.509 certificates on the subscriber side only.
Wireless Game adapters and Media Bridges
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
13. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
32
Unicast
A VPN to the office network
Other 802.11a devices
14. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Repeater
Obstacles
802.11b
WPA 2.0 personal and WPS
15. 802.11 uses CSMA/...
Monitor
CA - Collision avoidance
Spoof an address
Access point
16. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
WPA Enterprise -WEP -MAC filters
BSSID (Basic Service Set identifier)
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
17. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
802.11r
802.11a
Acknowledgement frames
18. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Client
Fakeauth
Frequency
19. What kind of Algorithm does WPA2 use?
MAC
AES = CCMP required
Restricts access to authorized users
Arp replay
20. The process in which a wireless LAN clients connection moves from one access point to another is called ______
2304 bytes
Mismatched SSID
CA - Collision avoidance
Roaming
21. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Personal mode and Enterprise Mode
Master
1 -6 -11
Refraction
22. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
Passphrase
Bridge mode
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
23. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Repeater
Access point
1 -6 -11
Wavelength
24. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
2304 bytes
Quality of Service
32 character maximum and is case sensitive
ERP-OFDM - DSSS
25. Collisions are detected through the use of....
Management - control - data
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
HT 20 MHz protection mode
Acknowledgement frames
26. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Restricts access to authorized users
802.11b
Two
27. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
Brute force - statistical and dictionary
802.11r
WPA Enterprise -WEP -MAC filters
28. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Plaintext
Fakeauth
Walled Garden.
Open system and Shared key
29. Bluetooth uses a radio technology called
Deauth
Three
6 -12 - and 24 Mbps
FHSS
30. What item has an effect on RF line of site?
Fakeauth
Carefully plan a strategy using WEP and VLANs
Obstacles
Greenfield mode
31. Give two examples of WGB devices.
Bridge mode
Wireless Game adapters and Media Bridges
802.11w
WPA Enterprise -WEP -MAC filters
32. High throughput mode 2
HT fixed mode
AES = CCMP required
SOHO brands that support WPS
HT 20 MHz protection mode
33. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Know the SSID and enter it manually
Unicast
Open system
34. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
Refraction
Unencrypted
11
35. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Restricts access to authorized users
802.11
Passve Scanning
802.11a
36. An independent basic service set (IBSS) consists of how many access points?
Residential and Enterprise
Fake auth
0
Client
37. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
4 channels
WPA2 -WEP
Degradation
25 MHz
38. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
HT 20 MHz protection mode
Wireless gateways
UNII
Trojan/Rogue APs - Arp spoofing - DNS spoofing
39. Typically a point-to-multipoint link consists of ____ connections
Three
Ad-Hoc
2.4-2.5GHz
AP to AP
40. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
802.11n
Personal mode and Enterprise Mode
One or more
Workgroup Bridge mode.
41. A weakness with MAC filtering is that it allows an intruder to ____
SSID and Channel
Spoof an address
TKIP - optional RC4
Reflection
42. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
1 -6 -11
Interference from a neighboring access point RF denial-of-service (Dos) attack
Data rate increases
Authentication
43. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Arp replay
Addresses wireless Quality of Service
Client
ARP spoofing
44. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
LTE
Dictionary
Active mode
DB and dBi
45. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
Access point
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
CA - Collision avoidance
46. The Layer 2 frame will be...
Unicast
Service sets
Unencrypted
Repeater
47. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
802.11i
Authenticate - associate
2.4-2.5GHz
WPA/WPA2
48. Maximum length of data (Frame body) is 2304 when ____ is not in use
FHSS
2.4-2.5GHz
Bridge mode
Encryption
49. Layer 2 Tunneling Protocol commonly uses which encryption method?
WPA2
Workgroup Bridge mode.
IPSec
PIN
50. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Residential and Enterprise
802.11b
Unicast
HT Non member protection mode