SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
FCC
Indoor and outdoor
802.11a
Management
2. This sets the card to participate in an independent basic service set
Fake auth
Ad-Hoc
1
Two
3. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
UNII
PIN
Height of an RF signal
Diffraction
4. What organization is responsible for unlicensed frequency band regulations in the United States?
Mismatched SSID
TKIP - optional RC4
FCC
Wireless gateways
5. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
CCMP
Single radio AP's
Small Office/Home Office Organizations (SOHO)
6. 802.11b is capable of which data rates?
LTE
Interference from a neighboring access point RF denial-of-service (Dos) attack
1 - 5.5 and 11 Mbps
Trojan/Rogue APs - Arp spoofing - DNS spoofing
7. A ______________ does not always use an omnidirectional antenna
HT 20 MHz protection mode
Fakeauth
Point-to-point link
Extended Service Set (ESS)
8. Layer 2 Tunneling Protocol commonly uses which encryption method?
Know the SSID and enter it manually
IPSec
2.4-2.5GHz
Amplitude and phase
9. High Throughput mode 0
40 bit
Wireless gateways
Addresses wireless Quality of Service
Greenfield mode
10. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
32
A VPN to the office network
3
Refraction
11. Which security methods do 802.11g access points support?
Fake auth
WPA Enterprise -WEP -MAC filters
Data rate increases
Three
12. the amplitude of an RF signal is
SOHO brands that support WPS
WEP
Height of an RF signal
FHSS
13. High throughput mode 3
Wi-Fi Alliance
HT fixed mode
Height of an RF signal
HT 20 MHz protection mode
14. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
CTS attacks - Deauth attack - Association flood - Jamming
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
15. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
Managed
Other 802.11a devices
802.11b HR/DSSS and 802.11 DSSS
16. an 802.11b 2.4GHz channel is how wide in MHz?
Independent
Wireless gateways
802.11a
22MHz wide
17. Probe requests are used by clients as part of the ____ process
Independent
4 channels
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Active scanning
18. What item has an effect on RF line of site?
Access point
A VPN to the office network
Active scanning
Obstacles
19. A brute force attack is limited to breaking___ WEP keys
40 bit
Root mode
802.11w
32 character maximum and is case sensitive
20. The length of a WEP key is typically ___ or ___
Wireless Game adapters and Media Bridges
64-bit - 128-bit
Dynamic Rate switching
Station (STA)
21. What kind of Algorithm does WPA2 use?
AES = CCMP required
Quality of Service
Mesh
Degradation
22. Both ___ and ___ are wireless LAN security methods that support shared key security.
CTS attacks - Deauth attack - Association flood - Jamming
WPA2 -WEP
Access point
Single radio AP's
23. 3 types of frames
FCC
802.11b
Management - control - data
AP to AP
24. The association process happens after which phase?
Wavelength
SSID (service set identifier)
Diffraction
Authentication
25. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Single radio AP's
4 channels
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11b HR/DSSS and 802.11 DSSS
26. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
802.11i
LTE
40 bit
27. This is the default mode that sets the card as a client that could then connect to an AP
Managed
Access point
Secure Layer 3 transmissions over a public network infrastructure
Single radio AP's
28. Name two absolute measures of RF power
Greenfield mode
Watt and mW
Dictionary
Number of users and software applications in use
29. What two devices use RF to communicate
802.11w
FHSS
Transmitter and receiver
Active scanning
30. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Extended Service Set (ESS)
BSSID (Basic Service Set identifier)
WEP
Mesh network
31. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Arp
HT 20 MHz protection mode
Spoof an address
Wavelength
32. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Know the SSID and enter it manually
TKIP - optional RC4
Wireless Game adapters and Media Bridges
ERP protection
33. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Access point
802.11n
Deauth
Small Office/Home Office Organizations (SOHO)
34. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
AP to AP
Dual radio APs
Trojan/Rogue APs
4 channels
35. An Ack is expected for every____ frame transmitted
Semi directional and Highly directional
UNII
Unicast
WPA2 -WEP
36. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
802.11r
ISM
LTE
802.11g
37. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Encryption
Interference from a neighboring access point RF denial-of-service (Dos) attack
Monitor
Service sets
38. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Ad-Hoc
Walled Garden.
Mismatched SSID
Unicast
39. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Diffraction
802.11n
22MHz wide
Walled Garden.
40. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Roaming
802.11r
Know the SSID and enter it manually
Active mode
41. Two characteristics of signals are
Wavelength
Two
Amplitude and phase
WPA2
42. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
802.11b HR/DSSS and 802.11 DSSS
40 bit
802.11i
43. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
DBi
Interference from a neighboring access point RF denial-of-service (Dos) attack
A VPN to the office network
Watt and mW
44. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Personal mode and Enterprise Mode
Unencrypted
Passphrase
RTS/CTS
45. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Beacons - Probe request - Probe response - Association Request - Reassociation Request
ARP spoofing
FHSS
46. What type of certification came from 802.11i
Trojan/Rogue APs
WPA2
Fakeauth
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
47. The 802.11i amendment to the standard addresses which of the following technologies?
Addresses wireless Quality of Service
11
Security
22MHz wide
48. According to the 802.11a amendment - which data rates are mandatory?
Two
Mesh
AP radio
6 -12 - and 24 Mbps
49. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
RTS/CTS
64-bit - 128-bit
Antenna diversity
50. The process in which a wireless LAN clients connection moves from one access point to another is called ______
40 bit
Roaming
Passve Scanning
Independent