SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 4 types of Denial of Service attacks
CA - Collision avoidance
CTS attacks - Deauth attack - Association flood - Jamming
6 -12 - and 24 Mbps
Authenticate - associate
2. The open system authentication process uses how many frames?
Two
FHSS
Dynamic Rate switching
Authenticate - associate
3. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Open system
4 channels
802.11n
ERP-OFDM - DSSS
4. 802.11g LAN operates in what frequency range?
Authentication
Deauth
Repeater
2.4-2.5GHz
5. 3 types of antennas
Management
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
2304 bytes
WPA2
6. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
2304 bytes
Fake auth
Other 802.11a devices
Trojan/Rogue APs
7. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Monitor
One or more
Personal mode and Enterprise Mode
Dictionary
8. High throughput mode 3
Wi-Fi Alliance
Access point
HT fixed mode
1 -6 -11
9. Probe requests are used by clients as part of the ____ process
Watt and mW
802.11g
Active scanning
AP to AP
10. This is the default mode that sets the card as a client that could then connect to an AP
AES = CCMP required
Personal mode and Enterprise Mode
Managed
MAC
11. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
0
WPA/WPA2
802.11g
12. When an RF signal bounces off a smooth non absorptive surface - the behavior is
802.11b
Reflection
ERP-OFDM - DSSS
3
13. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
CTS attacks - Deauth attack - Association flood - Jamming
Enter a username and password that will be central administered
1 -6 -11
Arp
14. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Security
A VPN to the office network
ARP spoofing
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
15. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Fake auth
2304 bytes
Open system
Management
16. A service set identifier (SSID) has a maximum limit of how many characters?
40 bit
ERP-OFDM - DSSS
32
AP to AP
17. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Open system and Shared key
Active scanning
Degradation
Unicast
18. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
HT Non member protection mode
802.11b HR/DSSS and 802.11 DSSS
AP radio
Refraction
19. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
802.11i
Repeater
Authenticate - associate
Watt and mW
20. Two authentication types defined in the 802.11 standard
Repeater
WPA2
RC4
Open system and Shared key
21. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Degradation
Wavelength
Beacons - Probe request - Probe response - Association Request - Reassociation Request
WPA2 -WEP
22. The radio card can operate in one of up to six possible modes of operation...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Dictionary
Plaintext
Mismatched SSID
23. What best describes the Wi-Fi alliance?
LTE
Interoperability testing organization
802.11r
Three
24. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Open system and Shared key
ISM
40 bit
Client
25. Aireplay-ng -0
Transmitter and receiver
Deauth
WPA 2.0 personal and WPS
PIN
26. Which function does RBAC provide?
6 -12 - and 24 Mbps
Restricts access to authorized users
Wireless Game adapters and Media Bridges
SSID (service set identifier)
27. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Plaintext
Service sets
Client
802.11g
28. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
14
ERP protection
Management
2.4-2.5GHz
29. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
Single radio AP's
25 MHz
Mesh network
30. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
11
4 channels
802.11a
Carefully plan a strategy using WEP and VLANs
31. A brute force attack is limited to breaking___ WEP keys
Bridge mode
DBi
40 bit
Automatically monitor the network for attacks
32. What kind of Algorithm does WPA2 use?
32 character maximum and is case sensitive
AES = CCMP required
Number of users and software applications in use
Diffraction
33. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
CA - Collision avoidance
ARP spoofing
Open system
Amplitude and phase
34. Name 3 channels considered non overlapping in the 2.4GHZ band
1 -6 -11
HT fixed mode
Amplitude and phase
7
35. The length of a WEP key is typically ___ or ___
802.11b
64-bit - 128-bit
HT 20 MHz protection mode
Brute force - statistical and dictionary
36. An Ack is expected for every____ frame transmitted
Three
14
Unicast
SSID and Channel
37. The 802.11g standard uses which two speed spectrum technologies.
Interference from a neighboring access point RF denial-of-service (Dos) attack
ERP-OFDM - DSSS
802.11g
Independent
38. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
39. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
Unicast
Roaming
Two
40. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Indoor and outdoor
Fakeauth
UNII
41. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Indoor and outdoor
Arp
FHSS
Dynamic Rate switching
42. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
Passphrase
Walled Garden.
Two
43. Aireplay-ng -3
Arp
Unencrypted
TKIP - optional RC4
Bridge mode
44. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
40 bit
Automatically monitor the network for attacks
Repeater
45. When a wireless LAN device listens for beacon frames - it is participating in which phase?
HT Non member protection mode
Client
14
Passve Scanning
46. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
X.509 certificates on the subscriber side only.
Interference from a neighboring access point RF denial-of-service (Dos) attack
Passphrase
47. an 802.11b 2.4GHz channel is how wide in MHz?
22MHz wide
Passphrase
ARP spoofing
One or more
48. 802.11 uses CSMA/...
Mismatched SSID
CA - Collision avoidance
Client
OFDM
49. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
WPA Enterprise -WEP -MAC filters
OFDM
CTS attacks - Deauth attack - Association flood - Jamming
50. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
LTE
Frequency
Workgroup Bridge mode.