SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When RF passes or bends around an obstacle such as a building or column - the behavior is
Independent
802.11b HR/DSSS and 802.11 DSSS
Diffraction
FCC
2. Two characteristics of signals are
Managed
2.4-2.5GHz
802.11r
Amplitude and phase
3. This is typically the 48-bit MAC address of the access point's radio card.
Wireless Game adapters and Media Bridges
BSSID (Basic Service Set identifier)
Wavelength
802.11r
4. As a device moves away from an access point - what is true regarding dynamic rate switching?
WPA2
Trojan/Rogue APs - Arp spoofing - DNS spoofing
0
Data rate increases
5. A ______________ does not always use an omnidirectional antenna
Antenna diversity
7
Active scanning
Point-to-point link
6. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
DBi
Small Office/Home Office Organizations (SOHO)
22MHz wide
25 MHz
8. A newly configured wireless intrusion prevention system will___
Arp
Automatically monitor the network for attacks
Workgroup Bridge mode.
DB and dBi
9. In this mode a station can act as a relay or WLAN range extender
SOHO brands that support WPS
Repeater
CCMP
Management - control - data
10. What best describes the Wi-Fi alliance?
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Captive portal
CCMP
Interoperability testing organization
11. ____ is also known as the Protected management frame standard
DBi
Arp
802.11w
11
12. Probe requests are used by clients as part of the ____ process
Active scanning
Amplitude and phase
Repeater
Two
13. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Automatically monitor the network for attacks
BSSID (Basic Service Set identifier)
Bridge mode
Authenticate - associate
14. Maximum length of data (Frame body) is 2304 when ____ is not in use
FCC
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Other 802.11a devices
Encryption
15. Which items are unique to a service set identifier
Access point
Number of users and software applications in use
32 character maximum and is case sensitive
Managed
16. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11n
Carefully plan a strategy using WEP and VLANs
Basic Service Set (BSS)
Access point
17. In this mode - the card acts as a normal access point
X.509 certificates on the subscriber side only.
Master
Small Office/Home Office Organizations (SOHO)
Secure Layer 3 transmissions over a public network infrastructure
18. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Managed
802.11b HR/DSSS and 802.11 DSSS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
UNII
19. A pre-shared key mode may be vulnerable to a ____ attack
32
UNII
Dictionary
TKIP - optional RC4
20. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Refraction
ERP-OFDM - DSSS
3
21. Two authentication types defined in the 802.11 standard
64-bit - 128-bit
3
Addresses wireless Quality of Service
Open system and Shared key
22. 802.11 frames have a maximum 'upper-layer' payload of...
Roaming
Dual radio APs
2304 bytes
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
23. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
LTE
X.509 certificates on the subscriber side only.
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
24. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Fake auth
Trojan/Rogue APs
Beacons - Probe request - Probe response - Association Request - Reassociation Request
802.11n
25. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Client
14
WPA2
26. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Management
802.11r
3
27. Give two examples of WGB devices.
Quality of Service
Open system and Shared key
Wireless Game adapters and Media Bridges
X.509 certificates on the subscriber side only.
28. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Automatically monitor the network for attacks
RTS/CTS
SSID (service set identifier)
Workgroup Bridge mode.
29. 802.11a uses which spread spectrum technology?
OFDM
802.11b
Independent
Access point
30. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Authenticate - associate
Roaming
Arp replay
Beacons - Probe request - Probe response - Association Request - Reassociation Request
31. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Access point
Fake auth
Secure Layer 3 transmissions over a public network infrastructure
Repeater
32. 802.11w can only be used in networks using_____
SSID (service set identifier)
WPA/WPA2
Dual radio APs
Authentication
33. In bluetooth - one master may communicate with up to ___ slaves in a piconet
HT 20 MHz protection mode
WPA Enterprise -WEP -MAC filters
RTS/CTS
7
34. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Active mode
Repeater
CA - Collision avoidance
Wireless gateways
35. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
802.11i
Ad-Hoc
Captive portal
Fake auth
36. The 802.11g standard uses which two speed spectrum technologies.
64-bit - 128-bit
ERP-OFDM - DSSS
Unicast
Automatically monitor the network for attacks
37. Bridge mode will not allow client associations and is ______ only
Wavelength
Client
LTE
AP to AP
38. The radio card can operate in one of up to six possible modes of operation...
ERP protection
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
WPA2 -WEP
802.11n
39. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Access point
Enter a username and password that will be central administered
Unicast
32 character maximum and is case sensitive
40. The 802.11i amendment to the standard addresses which of the following technologies?
Security
FHSS
2.4-2.5GHz
3
41. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
802.11b
Repeater
Walled Garden.
DBi
42. This is a topology in which two or more APs are connected by a common distribution system.
One or more
Extended Service Set (ESS)
802.11w
WEP
43. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Dual radio APs
0
ARP spoofing
RC4
44. Name 3 channels considered non overlapping in the 2.4GHZ band
Trojan/Rogue APs - Arp spoofing - DNS spoofing
1 -6 -11
Obstacles
Indoor and outdoor
45. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Watt and mW
DBi
11
40 bit
46. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Mismatched SSID
1
X.509 certificates on the subscriber side only.
47. A station can act as a routing node in a wireless mesh network
Mesh
1
DBi
25 MHz
48. An independent basic service set (IBSS) consists of how many access points?
0
Watt and mW
WEP
Fakeauth
49. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
Ad-Hoc
802.11n
Access point
50. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
14
Transmitter and receiver
Interference from a neighboring access point RF denial-of-service (Dos) attack
CTS attacks - Deauth attack - Association flood - Jamming