SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A service set identifier (SSID) has a maximum limit of how many characters?
Small Office/Home Office Organizations (SOHO)
32
Deauth
11
2. 802.11w can only be used in networks using_____
HT Non member protection mode
ERP-OFDM - DSSS
WPA/WPA2
Unicast
3. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Dual radio APs
Active mode
Plaintext
CCMP
4. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Mismatched SSID
SSID and Channel
ERP protection
5. High throughput mode 2
HT 20 MHz protection mode
Acknowledgement frames
25 MHz
Fakeauth
6. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Unicast
Authenticate - associate
Monitor
802.11b
7. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Monitor
Spoof an address
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Quality of Service
8. A pre-shared key mode may be vulnerable to a ____ attack
Management
802.11b HR/DSSS and 802.11 DSSS
Passphrase
Dictionary
9. Probe requests are used by clients as part of the ____ process
Wireless Game adapters and Media Bridges
Authenticate - associate
FHSS
Active scanning
10. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Management - control - data
ARP spoofing
4 channels
Workgroup Bridge mode.
11. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Ad-Hoc
802.11w
One or more
802.11g
12. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
32
Trojan/Rogue APs
Wavelength
13. Management frames are sent in....
HT fixed mode
Plaintext
Brute force - statistical and dictionary
Watt and mW
14. High Throughput mode 0
Data rate increases
A VPN to the office network
RTS/CTS
Greenfield mode
15. Two authentication types defined in the 802.11 standard
Open system and Shared key
Unicast
Frequency
802.11r
16. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
WPA 2.0 personal and WPS
LTE
Management
2.4-2.5GHz
17. 802.11a uses which spread spectrum technology?
Addresses wireless Quality of Service
Number of users and software applications in use
OFDM
Secure Layer 3 transmissions over a public network infrastructure
18. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Authenticate - associate
Arp replay
Passive scan
Transmitter and receiver
19. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
Dual radio APs
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
1 -6 -11
20. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
32 character maximum and is case sensitive
SOHO brands that support WPS
11
Station (STA)
21. Point to Point links typically use which antenna types?
Transmitter and receiver
Greenfield mode
Semi directional and Highly directional
Monitor
22. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Watt and mW
4 channels
WPA 2.0 personal and WPS
Passve Scanning
23. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Unicast
AP radio
Personal mode and Enterprise Mode
Number of users and software applications in use
24. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
WPA2
WPA 2.0 personal and WPS
Deauth
MAC
25. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Reflection
LTE
X.509 certificates on the subscriber side only.
25 MHz
26. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
27. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Transmitter and receiver
11
14
1 - 5.5 and 11 Mbps
28. 802.11g LAN operates in what frequency range?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Single radio AP's
2.4-2.5GHz
Dynamic Rate switching
29. ____ is also known as the Protected management frame standard
32 character maximum and is case sensitive
802.11w
0
Restricts access to authorized users
30. Typically a point-to-multipoint link consists of ____ connections
802.11a
Semi directional and Highly directional
Three
Mesh
31. ___ are used to describe the basic components and topology of a WLAN
Service sets
Extended Service Set (ESS)
Addresses wireless Quality of Service
WPA2 -WEP
32. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Trojan/Rogue APs
802.11a
WPA2
Number of users and software applications in use
33. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
802.11n
WPA2
Unencrypted
34. Maximum length of data (Frame body) is 2304 when ____ is not in use
Interoperability testing organization
Spoof an address
Encryption
Passphrase
35. High Throughput mode 1
Authenticate - associate
BSSID (Basic Service Set identifier)
HT Non member protection mode
Small Office/Home Office Organizations (SOHO)
36. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Active scanning
WPA2
7
A VPN to the office network
37. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Independent
6 -12 - and 24 Mbps
Antenna diversity
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
38. This is the default mode that sets the card as a client that could then connect to an AP
Managed
Addresses wireless Quality of Service
AP radio
Enter a username and password that will be central administered
39. an 802.11b 2.4GHz channel is how wide in MHz?
64-bit - 128-bit
22MHz wide
Acknowledgement frames
Active scanning
40. In bluetooth - one master may communicate with up to ___ slaves in a piconet
802.11g
Unencrypted
7
4 channels
41. In order to set up an ad hoc network a user must know which two parameters?
Frequency
7
SSID and Channel
Management
42. Wireless gateways come in two primary forms...
22MHz wide
Plaintext
Station (STA)
Residential and Enterprise
43. A newly configured wireless intrusion prevention system will___
Obstacles
Access point
Automatically monitor the network for attacks
Passve Scanning
44. Layer 2 Tunneling Protocol commonly uses which encryption method?
Interference from a neighboring access point RF denial-of-service (Dos) attack
Mesh network
Brute force - statistical and dictionary
IPSec
45. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Extended Service Set (ESS)
DBi
802.11w
Authenticate - associate
46. Which process is a VPN solution intended to provide for users connection to a network
Passive scan
Fakeauth
Secure Layer 3 transmissions over a public network infrastructure
Captive portal
47. This is a topology in which two or more APs are connected by a common distribution system.
Watt and mW
Extended Service Set (ESS)
0
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
48. What two devices use RF to communicate
Dynamic Rate switching
Interference from a neighboring access point RF denial-of-service (Dos) attack
Extended Service Set (ESS)
Transmitter and receiver
49. Aireplay-ng -3
Repeater
OFDM
Arp
802.11a
50. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
X.509 certificates on the subscriber side only.
802.11b
SSID (service set identifier)
AES = CCMP required