Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An Ack is expected for every____ frame transmitted






2. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






3. 802.11w can only be used in networks using_____






4. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






5. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






6. High Throughput mode 1






7. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






8. When RF passes or bends around an obstacle such as a building or column - the behavior is






9. the amplitude of an RF signal is






10. The security amendment to the IEEE 802.11 standard requires ____






11. High throughput mode 3






12. Which security methods do 802.11g access points support?






13. The 802.11g standard uses which two speed spectrum technologies.






14. What best describes the Wi-Fi alliance?






15. Give two examples of WGB devices.






16. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






17. What is regarded in 802.11e?






18. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






19. A brute force attack is limited to breaking___ WEP keys






20. This sets the card to participate in an independent basic service set






21. The process in which a wireless LAN clients connection moves from one access point to another is called ______






22. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi






23. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






24. In this mode - the card acts as a normal access point






25. Aireplay-ng -3






26. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






27. A basic service set (BSS) consists of how many access points






28. 802.11 frames have a maximum 'upper-layer' payload of...






29. 802.11b is capable of which data rates?






30. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






31. The association process happens after which phase?






32. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






33. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






34. Which data encryption.authentication method is identified in the IEEE 802.11 standard






35. A weakness with MAC filtering is that it allows an intruder to ____






36. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






37. Both ___ and ___ are wireless LAN security methods that support shared key security.






38. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






39. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






40. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






41. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






42. Which items are unique to a service set identifier






43. A ______________ does not always use an omnidirectional antenna






44. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






45. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






46. Name two relative measures of power






47. What two devices use RF to communicate






48. WPA was developed as an interim solution for which amendment to the 802.11 standards?






49. What organization is responsible for unlicensed frequency band regulations in the United States?






50. Maximum length of data (Frame body) is 2304 when ____ is not in use