SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which security methods do 802.11g access points support?
WPA Enterprise -WEP -MAC filters
HT Non member protection mode
Mesh
802.11b HR/DSSS and 802.11 DSSS
2. In this mode - the card acts as a normal access point
ARP spoofing
Master
Fakeauth
CCMP
3. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
4. 3 types of frames
Antenna diversity
Wireless Game adapters and Media Bridges
6 -12 - and 24 Mbps
Management - control - data
5. The 802.11i amendment to the standard addresses which of the following technologies?
Wireless Game adapters and Media Bridges
Extended Service Set (ESS)
Security
Three
6. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Know the SSID and enter it manually
Obstacles
Wireless gateways
Addresses wireless Quality of Service
7. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
32 character maximum and is case sensitive
Unicast
Mismatched SSID
Dictionary
8. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Know the SSID and enter it manually
Bridge mode
Roaming
1
9. The ___ acts as a hub for the WLAN; wireless frame pass through this device
WPA2 -WEP
Access point
Ad-Hoc
Watt and mW
10. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Management - control - data
Mesh
Station (STA)
Wavelength
11. 3 types of antennas
1 -6 -11
Workgroup Bridge mode.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Data rate increases
12. Management frames are sent in....
7
Walled Garden.
Enter a username and password that will be central administered
Plaintext
13. Bluetooth uses a radio technology called
ERP protection
FHSS
Mesh network
Restricts access to authorized users
14. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
RTS/CTS
Trojan/Rogue APs
Active scanning
15. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Mesh network
MAC
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Fake auth
16. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Deauth
Captive portal
1 - 5.5 and 11 Mbps
17. An Ack is expected for every____ frame transmitted
Unicast
Refraction
DB and dBi
Fakeauth
18. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Basic Service Set (BSS)
Station (STA)
14
Master
19. Aireplay-ng -0
Ad-Hoc
Other 802.11a devices
Deauth
ERP protection
20. 802.11b is capable of which data rates?
Small Office/Home Office Organizations (SOHO)
WPA2 -WEP
Access point
1 - 5.5 and 11 Mbps
21. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Passphrase
Management
ISM
Roaming
22. This is a topology in which two or more APs are connected by a common distribution system.
Mesh
Extended Service Set (ESS)
Walled Garden.
Semi directional and Highly directional
23. Layer 2 Tunneling Protocol commonly uses which encryption method?
Wireless Game adapters and Media Bridges
Arp replay
Authenticate - associate
IPSec
24. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Roaming
Management
Two
802.11b
25. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
ISM
Frequency
Walled Garden.
WEP
26. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
7
22MHz wide
Walled Garden.
Trojan/Rogue APs
27. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
ISM
Active mode
Small Office/Home Office Organizations (SOHO)
Enter a username and password that will be central administered
28. What best describes the Wi-Fi alliance?
Interoperability testing organization
WPA Enterprise -WEP -MAC filters
11
Wireless gateways
29. High Throughput mode 0
Greenfield mode
0
FHSS
Repeater
30. These are user configurable and present in only five 802.11 frame types...
Beacons - Probe request - Probe response - Association Request - Reassociation Request
32
2.4-2.5GHz
RTS/CTS
31. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Small Office/Home Office Organizations (SOHO)
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Wi-Fi Alliance
SSID (service set identifier)
32. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Refraction
Reflection
Management - control - data
Indoor and outdoor
33. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
WPA Enterprise -WEP -MAC filters
Refraction
Three
802.11w
34. Wireless gateways come in two primary forms...
802.11w
Residential and Enterprise
WEP
Wi-Fi Alliance
35. This sets the card to participate in an independent basic service set
802.11a
Wavelength
ERP-OFDM - DSSS
Ad-Hoc
36. A station can act as a routing node in a wireless mesh network
Repeater
Single radio AP's
Mesh
ERP protection
37. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
TKIP - optional RC4
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Workgroup Bridge mode.
Interference from a neighboring access point RF denial-of-service (Dos) attack
38. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Bridge mode
Personal mode and Enterprise Mode
802.11n
RTS/CTS
39. The Layer 2 frame will be...
WPA Enterprise -WEP -MAC filters
Management
Root mode
Unencrypted
40. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Wavelength
802.11
Security
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
41. A ______________ does not always use an omnidirectional antenna
Point-to-point link
Walled Garden.
HT fixed mode
Trojan/Rogue APs - Arp spoofing - DNS spoofing
42. The radio card can operate in one of up to six possible modes of operation...
DB and dBi
Arp
CTS attacks - Deauth attack - Association flood - Jamming
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
43. A brute force attack is limited to breaking___ WEP keys
Plaintext
AP radio
40 bit
Open system and Shared key
44. Which if the following organizations is responsible for standards compliance?
Independent
Semi directional and Highly directional
Two
Wi-Fi Alliance
45. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
OFDM
802.11a
3
Fakeauth
46. Name two absolute measures of RF power
Brute force - statistical and dictionary
Greenfield mode
Watt and mW
WEP
47. The length of a WEP key is typically ___ or ___
HT Non member protection mode
1 - 5.5 and 11 Mbps
64-bit - 128-bit
Mesh network
48. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
Management
Management - control - data
Two
49. When a wireless LAN device listens for beacon frames - it is participating in which phase?
IPSec
Passve Scanning
Diffraction
Unencrypted
50. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Open system and Shared key
Independent
RTS/CTS
802.11b HR/DSSS and 802.11 DSSS