SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A newly configured wireless intrusion prevention system will___
SOHO brands that support WPS
TKIP - optional RC4
Automatically monitor the network for attacks
Repeater
2. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
ERP-OFDM - DSSS
AES = CCMP required
WEP
3. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
2.4-2.5GHz
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
2304 bytes
4. High Throughput mode 0
Restricts access to authorized users
802.11g
Greenfield mode
UNII
5. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Antenna diversity
Other 802.11a devices
Trojan/Rogue APs
Management
6. Aireplay-ng -1
Fakeauth
Arp
IPSec
SSID and Channel
7. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
40 bit
RTS/CTS
Personal mode and Enterprise Mode
Station (STA)
8. This is a topology in which two or more APs are connected by a common distribution system.
Authenticate - associate
Repeater
Extended Service Set (ESS)
Active mode
9. A ______________ does not always use an omnidirectional antenna
Repeater
Management
Unicast
Point-to-point link
10. Typically a point-to-multipoint link consists of ____ connections
Automatically monitor the network for attacks
WEP
Reflection
Three
11. Point to Point links typically use which antenna types?
Semi directional and Highly directional
Management
Monitor
WPA2
12. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
802.11w
Monitor
Wavelength
13. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Enter a username and password that will be central administered
Active mode
Mesh network
BSSID (Basic Service Set identifier)
14. The length of a WEP key is typically ___ or ___
Open system and Shared key
Arp replay
TKIP - optional RC4
64-bit - 128-bit
15. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Bridge mode
FCC
SOHO brands that support WPS
16. What organization is responsible for unlicensed frequency band regulations in the United States?
25 MHz
Active scanning
FCC
SSID (service set identifier)
17. 802.11 frames have a maximum 'upper-layer' payload of...
Interoperability testing organization
2304 bytes
Watt and mW
Plaintext
18. High throughput mode 3
Active mode
BSSID (Basic Service Set identifier)
HT fixed mode
Wi-Fi Alliance
19. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
One or more
Wi-Fi Alliance
Basic Service Set (BSS)
RTS/CTS
20. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Authentication
802.11n
4 channels
21. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
Walled Garden.
2304 bytes
Number of users and software applications in use
22. In order to set up an ad hoc network a user must know which two parameters?
Security
SSID and Channel
Restricts access to authorized users
Refraction
23. In this mode a station can act as a relay or WLAN range extender
802.11b HR/DSSS and 802.11 DSSS
Unicast
Plaintext
Repeater
24. Which security methods do 802.11g access points support?
6 -12 - and 24 Mbps
Single radio AP's
WPA Enterprise -WEP -MAC filters
802.11g
25. Give two examples of WGB devices.
Active scanning
DBi
Wireless Game adapters and Media Bridges
Trojan/Rogue APs - Arp spoofing - DNS spoofing
26. The open system authentication process uses how many frames?
802.11b HR/DSSS and 802.11 DSSS
Active mode
Two
Passphrase
27. WiMAX 802.16 authentication is based on...
Dual radio APs
SSID (service set identifier)
X.509 certificates on the subscriber side only.
Access point
28. The 802.11g standard uses which two speed spectrum technologies.
Antenna diversity
Quality of Service
ERP-OFDM - DSSS
Station (STA)
29. A service set identifier (SSID) has a maximum limit of how many characters?
Mesh network
40 bit
32
Interference from a neighboring access point RF denial-of-service (Dos) attack
30. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Passive scan
PIN
SSID (service set identifier)
Mismatched SSID
31. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Deauth
Automatically monitor the network for attacks
Spoof an address
32. WI-Fi Protected Setup was designed for which of the following wireless applications?
Carefully plan a strategy using WEP and VLANs
Small Office/Home Office Organizations (SOHO)
Automatically monitor the network for attacks
RTS/CTS
33. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Basic Service Set (BSS)
Interference from a neighboring access point RF denial-of-service (Dos) attack
TKIP - optional RC4
X.509 certificates on the subscriber side only.
35. Aireplay-ng -0
Open system
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Deauth
HT fixed mode
36. What type of algorithm does WPA use
2.4-2.5GHz
Basic Service Set (BSS)
TKIP - optional RC4
Point-to-point link
37. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Unicast
AP radio
Monitor
Walled Garden.
38. an 802.11b 2.4GHz channel is how wide in MHz?
Access point
22MHz wide
11
6 -12 - and 24 Mbps
39. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
A VPN to the office network
Watt and mW
BSSID (Basic Service Set identifier)
40. Two characteristics of signals are
14
3
Greenfield mode
Amplitude and phase
41. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Authenticate - associate
Arp
Roaming
802.11r
42. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
LTE
Quality of Service
Passphrase
Reflection
43. This is the default mode that sets the card as a client that could then connect to an AP
Fakeauth
Ad-Hoc
Managed
Open system and Shared key
44. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
Independent
Master
Encryption
45. When RF passes or bends around an obstacle such as a building or column - the behavior is
Unicast
802.11r
Frequency
Diffraction
46. WPA was developed as an interim solution for which amendment to the 802.11 standards?
1
Addresses wireless Quality of Service
802.11i
Independent
47. These are user configurable and present in only five 802.11 frame types...
Wavelength
Beacons - Probe request - Probe response - Association Request - Reassociation Request
CCMP
Roaming
48. The association process happens after which phase?
Authentication
HT Non member protection mode
Access point
Semi directional and Highly directional
49. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
2.4-2.5GHz
Repeater
Secure Layer 3 transmissions over a public network infrastructure
Watt and mW
50. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Open system
4 channels
LTE