SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WPA was developed as an interim solution for which amendment to the 802.11 standards?
1
Obstacles
Open system and Shared key
802.11i
2. What organization is responsible for unlicensed frequency band regulations in the United States?
Access point
FCC
ARP spoofing
DB and dBi
3. A basic service set identifier (BSSID) is the MAC address of the ____
Secure Layer 3 transmissions over a public network infrastructure
Security
MAC
AP radio
4. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
22MHz wide
MAC
Carefully plan a strategy using WEP and VLANs
Dynamic Rate switching
5. ____ is also known as the Protected management frame standard
Security
Addresses wireless Quality of Service
802.11w
Number of users and software applications in use
6. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Spoof an address
Root mode
14
7. The 802.11g standard uses which two speed spectrum technologies.
Quality of Service
Addresses wireless Quality of Service
ERP-OFDM - DSSS
AP radio
8. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
4 channels
Fake auth
802.11i
HT Non member protection mode
9. Two authentication types defined in the 802.11 standard
Single radio AP's
Wireless Game adapters and Media Bridges
Secure Layer 3 transmissions over a public network infrastructure
Open system and Shared key
10. 802.11g LAN operates in what frequency range?
Number of users and software applications in use
Reflection
2.4-2.5GHz
802.11w
11. WiMAX 802.16 authentication is based on...
Residential and Enterprise
DB and dBi
X.509 certificates on the subscriber side only.
Watt and mW
12. High Throughput mode 1
HT Non member protection mode
Quality of Service
Captive portal
ISM
13. WI-Fi Protected Setup was designed for which of the following wireless applications?
Small Office/Home Office Organizations (SOHO)
1
Open system
Authenticate - associate
14. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Reflection
11
Repeater
Station (STA)
15. Three types of passive WEP attacks
Brute force - statistical and dictionary
Degradation
Antenna diversity
Dynamic Rate switching
16. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Indoor and outdoor
40 bit
RTS/CTS
Trojan/Rogue APs
17. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Single radio AP's
Secure Layer 3 transmissions over a public network infrastructure
SSID (service set identifier)
TKIP - optional RC4
18. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
SOHO brands that support WPS
4 channels
AES = CCMP required
Quality of Service
19. Which data encryption.authentication method is identified in the IEEE 802.11 standard
MAC
802.11i
WEP
Station (STA)
20. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
Transmitter and receiver
Trojan/Rogue APs
Height of an RF signal
21. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
64-bit - 128-bit
Walled Garden.
Diffraction
MAC
22. What item has an effect on RF line of site?
Obstacles
Open system
Three
ERP protection
23. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
PIN
WPA2
22MHz wide
Automatically monitor the network for attacks
24. The 802.11i amendment to the standard addresses which of the following technologies?
Two
802.11n
Management - control - data
Security
25. 802.11 uses CSMA/...
MAC
SSID and Channel
CA - Collision avoidance
Dictionary
26. As a device moves away from an access point - what is true regarding dynamic rate switching?
Repeater
Management
Data rate increases
Walled Garden.
27. Management frames are sent in....
SOHO brands that support WPS
WEP
Repeater
Plaintext
28. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Wi-Fi Alliance
Number of users and software applications in use
Antenna diversity
Transmitter and receiver
29. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
SSID and Channel
MAC
Passive scan
A VPN to the office network
30. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Client
802.11n
Passphrase
4 channels
31. Aireplay-ng -3
ISM
Semi directional and Highly directional
Arp
2304 bytes
32. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Three
Single radio AP's
FHSS
Enter a username and password that will be central administered
33. An independent basic service set (IBSS) consists of how many access points?
AP radio
Quality of Service
0
Active mode
34. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
DB and dBi
802.11
TKIP - optional RC4
35. Bridge mode will not allow client associations and is ______ only
4 channels
One or more
PIN
AP to AP
36. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Point-to-point link
Bridge mode
Unicast
Monitor
37. In bluetooth - one master may communicate with up to ___ slaves in a piconet
32
Greenfield mode
6 -12 - and 24 Mbps
7
38. Typically a point-to-multipoint link consists of ____ connections
Authenticate - associate
Three
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Wireless gateways
39. In this mode a station can act as a relay or WLAN range extender
Repeater
AP radio
Roaming
ERP protection
40. Name 3 channels considered non overlapping in the 2.4GHZ band
Extended Service Set (ESS)
1 -6 -11
ISM
Security
41. Beacons allow client devices to ____ for available LANS
A VPN to the office network
Captive portal
Passive scan
WEP
42. High throughput mode 2
HT 20 MHz protection mode
Two
Carefully plan a strategy using WEP and VLANs
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
43. According to the 802.11a amendment - which data rates are mandatory?
Workgroup Bridge mode.
WPA/WPA2
Semi directional and Highly directional
6 -12 - and 24 Mbps
44. The Layer 2 frame will be...
UNII
WPA/WPA2
Unencrypted
Wireless Game adapters and Media Bridges
45. This type of authentication is essentially 'Null authentication'
HT fixed mode
802.11a
Unencrypted
Open system
46. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
14
SSID (service set identifier)
802.11b HR/DSSS and 802.11 DSSS
2304 bytes
47. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
RTS/CTS
FHSS
Quality of Service
Client
48. 802.11w can only be used in networks using_____
Walled Garden.
802.11
Trojan/Rogue APs - Arp spoofing - DNS spoofing
WPA/WPA2
49. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Quality of Service
Three
Master
25 MHz
50. The capacity of an access point is dependent upon which factors?
Trojan/Rogue APs - Arp spoofing - DNS spoofing
RTS/CTS
Number of users and software applications in use
Degradation