Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






2. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






3. Aireplay-ng -3






4. Name 3 channels considered non overlapping in the 2.4GHZ band






5. The length of a WEP key is typically ___ or ___






6. 802.11b is capable of which data rates?






7. According to the 802.11a amendment - which data rates are mandatory?






8. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






9. A brute force attack is limited to breaking___ WEP keys






10. ___ are used to describe the basic components and topology of a WLAN






11. A service set identifier (SSID) has a maximum limit of how many characters?






12. In bluetooth - one master may communicate with up to ___ slaves in a piconet






13. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






14. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






15. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






16. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






17. The 802.11g standard uses which two speed spectrum technologies.






18. Layer 2 Tunneling Protocol commonly uses which encryption method?






19. Management frames are sent in....






20. High throughput mode 2






21. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






22. What type of certification came from 802.11i






23. These are user configurable and present in only five 802.11 frame types...






24. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






25. Point to Point links typically use which antenna types?






26. 802.11w can only be used in networks using_____






27. In this mode - the card acts as a normal access point






28. 3 types of antennas






29. This is a topology in which two or more APs are connected by a common distribution system.






30. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






31. Which security methods do 802.11g access points support?






32. A weakness with MAC filtering is that it allows an intruder to ____






33. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


34. In repeater mode - the repeater device connects to a normal '___ mode'






35. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






36. The open system authentication process uses how many frames?






37. What is regarded in 802.11e?






38. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






39. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






40. An Ack is expected for every____ frame transmitted






41. Both ___ and ___ are wireless LAN security methods that support shared key security.






42. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






43. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






44. A ______________ does not always use an omnidirectional antenna






45. When a wireless LAN device listens for beacon frames - it is participating in which phase?






46. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






47. Give two examples of WGB devices.






48. This sets the card to participate in an independent basic service set






49. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






50. WPA was developed as an interim solution for which amendment to the 802.11 standards?