SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An Ack is expected for every____ frame transmitted
6 -12 - and 24 Mbps
Unicast
22MHz wide
Three
2. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Dual radio APs
Captive portal
22MHz wide
Roaming
3. 802.11w can only be used in networks using_____
WPA/WPA2
Passphrase
2304 bytes
Management
4. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
HT 20 MHz protection mode
Mismatched SSID
Unencrypted
Beacons - Probe request - Probe response - Association Request - Reassociation Request
5. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
CA - Collision avoidance
2304 bytes
11
32
6. High Throughput mode 1
Encryption
Spoof an address
HT Non member protection mode
Secure Layer 3 transmissions over a public network infrastructure
7. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Authenticate - associate
A VPN to the office network
X.509 certificates on the subscriber side only.
Encryption
8. When RF passes or bends around an obstacle such as a building or column - the behavior is
Small Office/Home Office Organizations (SOHO)
Management - control - data
Diffraction
DB and dBi
9. the amplitude of an RF signal is
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Dictionary
Access point
Height of an RF signal
10. The security amendment to the IEEE 802.11 standard requires ____
Trojan/Rogue APs - Arp spoofing - DNS spoofing
CCMP
Extended Service Set (ESS)
22MHz wide
11. High throughput mode 3
Unicast
One or more
Secure Layer 3 transmissions over a public network infrastructure
HT fixed mode
12. Which security methods do 802.11g access points support?
Restricts access to authorized users
Diffraction
Other 802.11a devices
WPA Enterprise -WEP -MAC filters
13. The 802.11g standard uses which two speed spectrum technologies.
Two
Know the SSID and enter it manually
ERP-OFDM - DSSS
Captive portal
14. What best describes the Wi-Fi alliance?
Interoperability testing organization
ISM
Service sets
Deauth
15. Give two examples of WGB devices.
UNII
2.4-2.5GHz
Wireless Game adapters and Media Bridges
BSSID (Basic Service Set identifier)
16. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
802.11b HR/DSSS and 802.11 DSSS
ISM
Arp
Access point
17. What is regarded in 802.11e?
Addresses wireless Quality of Service
Indoor and outdoor
HT 20 MHz protection mode
Workgroup Bridge mode.
18. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Fakeauth
Enter a username and password that will be central administered
SSID (service set identifier)
22MHz wide
19. A brute force attack is limited to breaking___ WEP keys
Personal mode and Enterprise Mode
Security
40 bit
Access point
20. This sets the card to participate in an independent basic service set
Single radio AP's
Ad-Hoc
Mismatched SSID
Acknowledgement frames
21. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Access point
2.4-2.5GHz
Two
Roaming
22. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Active mode
Trojan/Rogue APs
Personal mode and Enterprise Mode
Residential and Enterprise
23. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Security
A VPN to the office network
32 character maximum and is case sensitive
PIN
24. In this mode - the card acts as a normal access point
Two
Obstacles
Master
Personal mode and Enterprise Mode
25. Aireplay-ng -3
Arp
WPA 2.0 personal and WPS
Management
2.4-2.5GHz
26. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Number of users and software applications in use
BSSID (Basic Service Set identifier)
802.11a
HT Non member protection mode
27. A basic service set (BSS) consists of how many access points
32 character maximum and is case sensitive
Plaintext
1
2.4-2.5GHz
28. 802.11 frames have a maximum 'upper-layer' payload of...
Open system
2304 bytes
Independent
Semi directional and Highly directional
29. 802.11b is capable of which data rates?
1 - 5.5 and 11 Mbps
Passphrase
Height of an RF signal
Managed
30. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Transmitter and receiver
Other 802.11a devices
25 MHz
Mesh
31. The association process happens after which phase?
WPA/WPA2
WPA2 -WEP
Authentication
ISM
32. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Interoperability testing organization
802.11b HR/DSSS and 802.11 DSSS
Other 802.11a devices
Basic Service Set (BSS)
33. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Trojan/Rogue APs
OFDM
RC4
ARP spoofing
34. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Refraction
WEP
Carefully plan a strategy using WEP and VLANs
Dynamic Rate switching
35. A weakness with MAC filtering is that it allows an intruder to ____
Access point
Know the SSID and enter it manually
ARP spoofing
Spoof an address
36. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
0
SOHO brands that support WPS
Monitor
Indoor and outdoor
37. Both ___ and ___ are wireless LAN security methods that support shared key security.
32 character maximum and is case sensitive
WPA2 -WEP
Obstacles
SSID and Channel
38. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Diffraction
Passve Scanning
Quality of Service
HT 20 MHz protection mode
39. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Two
Secure Layer 3 transmissions over a public network infrastructure
802.11b
WPA Enterprise -WEP -MAC filters
40. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
WPA2 -WEP
Interference from a neighboring access point RF denial-of-service (Dos) attack
HT 20 MHz protection mode
41. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Carefully plan a strategy using WEP and VLANs
Fakeauth
3
SSID (service set identifier)
42. Which items are unique to a service set identifier
Restricts access to authorized users
Roaming
ERP-OFDM - DSSS
32 character maximum and is case sensitive
43. A ______________ does not always use an omnidirectional antenna
IPSec
802.11b HR/DSSS and 802.11 DSSS
32
Point-to-point link
44. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
1 -6 -11
Independent
SOHO brands that support WPS
Quality of Service
45. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
AP to AP
BSSID (Basic Service Set identifier)
ERP protection
Passphrase
46. Name two relative measures of power
DB and dBi
TKIP - optional RC4
Wi-Fi Alliance
CTS attacks - Deauth attack - Association flood - Jamming
47. What two devices use RF to communicate
Transmitter and receiver
WEP
802.11n
Wireless gateways
48. WPA was developed as an interim solution for which amendment to the 802.11 standards?
14
Small Office/Home Office Organizations (SOHO)
Diffraction
802.11i
49. What organization is responsible for unlicensed frequency band regulations in the United States?
IPSec
FCC
Security
DB and dBi
50. Maximum length of data (Frame body) is 2304 when ____ is not in use
Extended Service Set (ESS)
Encryption
Carefully plan a strategy using WEP and VLANs
Authentication