SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Degradation
4 channels
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Arp replay
2. When a wireless LAN device listens for beacon frames - it is participating in which phase?
ERP protection
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Passve Scanning
802.11w
3. In repeater mode - the repeater device connects to a normal '___ mode'
Obstacles
WPA2 -WEP
Root mode
Extended Service Set (ESS)
4. A service set identifier (SSID) has a maximum limit of how many characters?
32
Open system
Basic Service Set (BSS)
Ad-Hoc
5. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Basic Service Set (BSS)
UNII
PIN
6. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Obstacles
2304 bytes
SSID and Channel
7. The open system authentication process uses how many frames?
Two
1
Addresses wireless Quality of Service
SOHO brands that support WPS
8. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
One or more
PIN
9. The security amendment to the IEEE 802.11 standard requires ____
25 MHz
Restricts access to authorized users
CCMP
ARP spoofing
10. Name two absolute measures of RF power
Other 802.11a devices
Watt and mW
Mismatched SSID
Unicast
11. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
MAC
1
Know the SSID and enter it manually
12. According to the 802.11a amendment - which data rates are mandatory?
Managed
Roaming
UNII
6 -12 - and 24 Mbps
13. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
Security
Open system
Obstacles
14. Collisions are detected through the use of....
Secure Layer 3 transmissions over a public network infrastructure
Know the SSID and enter it manually
Acknowledgement frames
Client
15. Which process is a VPN solution intended to provide for users connection to a network
802.11n
WPA2 -WEP
Secure Layer 3 transmissions over a public network infrastructure
Semi directional and Highly directional
16. Beacons allow client devices to ____ for available LANS
Interference from a neighboring access point RF denial-of-service (Dos) attack
Passive scan
Residential and Enterprise
Dictionary
17. Aireplay-ng -1
Fakeauth
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Watt and mW
Dynamic Rate switching
18. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Open system
Number of users and software applications in use
One or more
WEP
19. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Wireless gateways
Client
802.11g
11
20. 3 types of frames
Management - control - data
X.509 certificates on the subscriber side only.
Restricts access to authorized users
TKIP - optional RC4
21. The Access point can operate in a variety of modes...
0
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
1 -6 -11
Amplitude and phase
22. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Amplitude and phase
2304 bytes
Authenticate - associate
25 MHz
23. WI-Fi Protected Setup was designed for which of the following wireless applications?
Amplitude and phase
Authenticate - associate
Unicast
Small Office/Home Office Organizations (SOHO)
24. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Know the SSID and enter it manually
Management
Wavelength
802.11b HR/DSSS and 802.11 DSSS
25. Which items are unique to a service set identifier
32 character maximum and is case sensitive
Extended Service Set (ESS)
Transmitter and receiver
CCMP
26. the amplitude of an RF signal is
Fake auth
Passve Scanning
Mesh network
Height of an RF signal
27. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
4 channels
UNII
28. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
Quality of Service
3
IPSec
29. WiMAX 802.16 authentication is based on...
IPSec
Independent
X.509 certificates on the subscriber side only.
64-bit - 128-bit
30. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Walled Garden.
Extended Service Set (ESS)
SSID (service set identifier)
Antenna diversity
31. 802.11a uses which spread spectrum technology?
OFDM
Roaming
802.11b
Captive portal
32. 802.11 uses CSMA/...
Semi directional and Highly directional
CA - Collision avoidance
WPA 2.0 personal and WPS
Beacons - Probe request - Probe response - Association Request - Reassociation Request
33. This is typically the 48-bit MAC address of the access point's radio card.
Know the SSID and enter it manually
BSSID (Basic Service Set identifier)
4 channels
Active mode
34. Name two relative measures of power
11
DB and dBi
Repeater
ISM
35. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
WPA2
Personal mode and Enterprise Mode
Antenna diversity
Management
36. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Carefully plan a strategy using WEP and VLANs
802.11g
Wireless gateways
Walled Garden.
37. Which function does RBAC provide?
Addresses wireless Quality of Service
Restricts access to authorized users
Active mode
802.11b
38. WPA was developed as an interim solution for which amendment to the 802.11 standards?
22MHz wide
7
802.11i
Quality of Service
39. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
Repeater
AES = CCMP required
WPA2
40. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
RTS/CTS
Transmitter and receiver
X.509 certificates on the subscriber side only.
ISM
41. Name 3 channels considered non overlapping in the 2.4GHZ band
Degradation
Spoof an address
11
1 -6 -11
42. High throughput mode 3
AES = CCMP required
Basic Service Set (BSS)
LTE
HT fixed mode
43. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Secure Layer 3 transmissions over a public network infrastructure
RC4
4 channels
44. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
Number of users and software applications in use
Obstacles
Passphrase
45. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Trojan/Rogue APs
2304 bytes
802.11r
Wireless gateways
46. A basic service set identifier (BSSID) is the MAC address of the ____
802.11g
AP radio
802.11r
Active scanning
47. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Active scanning
Roaming
Mismatched SSID
Deauth
48. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Master
RTS/CTS
Mesh network
Open system
49. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
7
Basic Service Set (BSS)
CA - Collision avoidance
11
50. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Encryption
Reflection
802.11g
DB and dBi