SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Single radio AP's
Management - control - data
Access point
Bridge mode
2. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
BSSID (Basic Service Set identifier)
Height of an RF signal
Open system
3. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
1
Dynamic Rate switching
14
1 -6 -11
4. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Access point
Deauth
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
32 character maximum and is case sensitive
5. This is the default mode that sets the card as a client that could then connect to an AP
Trojan/Rogue APs
Restricts access to authorized users
Managed
Small Office/Home Office Organizations (SOHO)
6. Which security methods do 802.11g access points support?
Quality of Service
WPA Enterprise -WEP -MAC filters
1 -6 -11
802.11
7. The Access point can operate in a variety of modes...
Workgroup Bridge mode.
Reflection
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
802.11a
8. an 802.11b 2.4GHz channel is how wide in MHz?
Access point
802.11b
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
22MHz wide
9. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Frequency
ERP protection
Reflection
802.11g
10. A service set identifier (SSID) has a maximum limit of how many characters?
Fake auth
32
HT Non member protection mode
7
11. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
SSID (service set identifier)
Extended Service Set (ESS)
Frequency
Two
12. What type of algorithm does WPA use
TKIP - optional RC4
Watt and mW
Point-to-point link
ISM
13. In this mode a station can act as a relay or WLAN range extender
Security
ARP spoofing
Data rate increases
Repeater
14. What is the gain of an antenna measured in
OFDM
DBi
PIN
WEP
15. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
16. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Basic Service Set (BSS)
Beacons - Probe request - Probe response - Association Request - Reassociation Request
PIN
17. Which items are unique to a service set identifier
Frequency
Passve Scanning
Roaming
32 character maximum and is case sensitive
18. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Arp
3
AES = CCMP required
FHSS
19. High throughput mode 3
64-bit - 128-bit
HT fixed mode
Dynamic Rate switching
Authenticate - associate
20. What is regarded in 802.11e?
Addresses wireless Quality of Service
Beacons - Probe request - Probe response - Association Request - Reassociation Request
AP radio
Service sets
21. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
FCC
WPA Enterprise -WEP -MAC filters
X.509 certificates on the subscriber side only.
22. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
FCC
Dictionary
11
23. A basic service set (BSS) consists of how many access points
7
1
Captive portal
Interference from a neighboring access point RF denial-of-service (Dos) attack
24. The Layer 2 frame will be...
Unencrypted
Authentication
Interoperability testing organization
CCMP
25. Which data encryption.authentication method is identified in the IEEE 802.11 standard
802.11b HR/DSSS and 802.11 DSSS
WEP
Roaming
Basic Service Set (BSS)
26. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
HT Non member protection mode
40 bit
Dynamic Rate switching
802.11
27. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Point-to-point link
Passve Scanning
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Encryption
28. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
PIN
Ad-Hoc
Access point
Dynamic Rate switching
29. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Automatically monitor the network for attacks
Indoor and outdoor
1
Service sets
30. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
64-bit - 128-bit
Access point
DB and dBi
CTS attacks - Deauth attack - Association flood - Jamming
31. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Small Office/Home Office Organizations (SOHO)
Transmitter and receiver
Amplitude and phase
Interference from a neighboring access point RF denial-of-service (Dos) attack
32. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Interoperability testing organization
Repeater
802.11i
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
33. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Quality of Service
Personal mode and Enterprise Mode
Refraction
Walled Garden.
34. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
OFDM
AP to AP
Passive scan
35. A newly configured wireless intrusion prevention system will___
Two
Security
Automatically monitor the network for attacks
One or more
36. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Wavelength
Wi-Fi Alliance
802.11n
802.11a
37. 802.11w can only be used in networks using_____
WPA 2.0 personal and WPS
802.11r
WPA/WPA2
Dual radio APs
38. What two devices use RF to communicate
Encryption
Transmitter and receiver
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Passve Scanning
39. An Ack is expected for every____ frame transmitted
22MHz wide
Managed
Unicast
Access point
40. Name two absolute measures of RF power
Data rate increases
Watt and mW
11
Monitor
41. Two characteristics of signals are
Monitor
802.11
Amplitude and phase
IPSec
42. High Throughput mode 0
RTS/CTS
Repeater
Greenfield mode
AES = CCMP required
43. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
CCMP
ARP spoofing
Basic Service Set (BSS)
44. Beacons allow client devices to ____ for available LANS
Passive scan
802.11
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Mesh network
45. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
CA - Collision avoidance
Wavelength
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Monitor
46. In this mode - the card acts as a normal access point
Master
AES = CCMP required
Spoof an address
Greenfield mode
47. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Wi-Fi Alliance
Arp replay
LTE
SSID (service set identifier)
48. Two authentication types defined in the 802.11 standard
Repeater
Number of users and software applications in use
X.509 certificates on the subscriber side only.
Open system and Shared key
49. What type of wireless network device is PIN-based security most commonly used with
Dual radio APs
HT 20 MHz protection mode
SOHO brands that support WPS
Security
50. Aireplay-ng -3
Wi-Fi Alliance
Ad-Hoc
OFDM
Arp