SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Maximum length of data (Frame body) is 2304 when ____ is not in use
Repeater
Captive portal
Encryption
Dual radio APs
2. Aireplay-ng -3
Mesh network
Arp
Arp replay
Management - control - data
3. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
ERP-OFDM - DSSS
Basic Service Set (BSS)
WPA 2.0 personal and WPS
WPA2 -WEP
4. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11n
BSSID (Basic Service Set identifier)
SOHO brands that support WPS
Mesh network
5. A pre-shared key mode may be vulnerable to a ____ attack
Roaming
Dictionary
Diffraction
3
6. ___ are used to describe the basic components and topology of a WLAN
Indoor and outdoor
Service sets
Authentication
Addresses wireless Quality of Service
7. A basic service set (BSS) consists of how many access points
1
Dual radio APs
Fake auth
1 -6 -11
8. Wireless gateways come in two primary forms...
Brute force - statistical and dictionary
Residential and Enterprise
LTE
PIN
9. Give two examples of WGB devices.
Captive portal
2304 bytes
11
Wireless Game adapters and Media Bridges
10. The security amendment to the IEEE 802.11 standard requires ____
A VPN to the office network
Quality of Service
CCMP
Trojan/Rogue APs
11. What algorithm does WEP use
Passphrase
FHSS
Open system
RC4
12. The length of a WEP key is typically ___ or ___
64-bit - 128-bit
Repeater
Repeater
Open system and Shared key
13. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
802.11
Fake auth
FHSS
Point-to-point link
14. Name two absolute measures of RF power
Passve Scanning
FCC
Watt and mW
Quality of Service
15. Collisions are detected through the use of....
Open system and Shared key
Acknowledgement frames
WPA/WPA2
Residential and Enterprise
16. Two characteristics of signals are
Amplitude and phase
32
One or more
32 character maximum and is case sensitive
17. The 802.11g standard uses which two speed spectrum technologies.
Reflection
ERP-OFDM - DSSS
32
Management
18. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
TKIP - optional RC4
Client
Monitor
19. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Addresses wireless Quality of Service
WPA 2.0 personal and WPS
7
Wavelength
20. A station can act as a routing node in a wireless mesh network
Workgroup Bridge mode.
MAC
Mesh
1
21. 802.11b is capable of which data rates?
6 -12 - and 24 Mbps
Open system and Shared key
1 - 5.5 and 11 Mbps
Secure Layer 3 transmissions over a public network infrastructure
22. In this mode a station can act as a relay or WLAN range extender
Amplitude and phase
Root mode
ERP protection
Repeater
23. 802.11g LAN operates in what frequency range?
ISM
1 - 5.5 and 11 Mbps
2.4-2.5GHz
1
24. Three types of passive WEP attacks
Management - control - data
Active mode
Station (STA)
Brute force - statistical and dictionary
25. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
Fakeauth
Client
Passve Scanning
26. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
One or more
Indoor and outdoor
Bridge mode
27. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
1 - 5.5 and 11 Mbps
SOHO brands that support WPS
Active mode
Deauth
28. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
802.11r
Service sets
Fakeauth
29. WI-Fi Protected Setup was designed for which of the following wireless applications?
Mesh
Small Office/Home Office Organizations (SOHO)
X.509 certificates on the subscriber side only.
Master
30. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Watt and mW
Monitor
Reflection
802.11w
31. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
WPA 2.0 personal and WPS
Bridge mode
RTS/CTS
BSSID (Basic Service Set identifier)
32. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
CCMP
Repeater
Open system and Shared key
Interference from a neighboring access point RF denial-of-service (Dos) attack
33. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
BSSID (Basic Service Set identifier)
Automatically monitor the network for attacks
FCC
34. Typically a point-to-multipoint link consists of ____ connections
Three
CA - Collision avoidance
Residential and Enterprise
Fakeauth
35. A service set identifier (SSID) has a maximum limit of how many characters?
ERP protection
Transmitter and receiver
Spoof an address
32
36. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
AP to AP
Automatically monitor the network for attacks
Station (STA)
37. High Throughput mode 1
Watt and mW
HT Non member protection mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Indoor and outdoor
38. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Repeater
Active scanning
Antenna diversity
802.11g
39. Aireplay-ng -1
Spoof an address
Quality of Service
Fakeauth
Workgroup Bridge mode.
40. 802.11 uses CSMA/...
2.4-2.5GHz
PIN
CA - Collision avoidance
1 - 5.5 and 11 Mbps
41. 802.11w can only be used in networks using_____
4 channels
SSID and Channel
WPA/WPA2
Indoor and outdoor
42. 3 types of frames
Management - control - data
Quality of Service
11
Ad-Hoc
43. What item has an effect on RF line of site?
Trojan/Rogue APs - Arp spoofing - DNS spoofing
CTS attacks - Deauth attack - Association flood - Jamming
Residential and Enterprise
Obstacles
44. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
Plaintext
1 -6 -11
AES = CCMP required
45. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
HT 20 MHz protection mode
Active scanning
One or more
Independent
46. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Know the SSID and enter it manually
Quality of Service
CCMP
Master
47. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
32 character maximum and is case sensitive
25 MHz
6 -12 - and 24 Mbps
48. Which items are unique to a service set identifier
32 character maximum and is case sensitive
25 MHz
Authenticate - associate
Plaintext
49. 3 types of antennas
Quality of Service
Watt and mW
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Spoof an address
50. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Data rate increases
Fake auth
WEP
Deauth