SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two authentication types defined in the 802.11 standard
0
40 bit
Open system and Shared key
LTE
2. A basic service set (BSS) consists of how many access points
1
Wireless Game adapters and Media Bridges
Diffraction
Fakeauth
3. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Master
Indoor and outdoor
Other 802.11a devices
WEP
4. In bluetooth - one master may communicate with up to ___ slaves in a piconet
7
Automatically monitor the network for attacks
Secure Layer 3 transmissions over a public network infrastructure
Addresses wireless Quality of Service
5. As a device moves away from an access point - what is true regarding dynamic rate switching?
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Acknowledgement frames
Data rate increases
1
6. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Number of users and software applications in use
Management
OFDM
RC4
7. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Trojan/Rogue APs
Degradation
Arp replay
802.11
8. What type of wireless network device is PIN-based security most commonly used with
FCC
SOHO brands that support WPS
LTE
WEP
9. What kind of Algorithm does WPA2 use?
Acknowledgement frames
AES = CCMP required
X.509 certificates on the subscriber side only.
WPA Enterprise -WEP -MAC filters
10. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Other 802.11a devices
802.11b HR/DSSS and 802.11 DSSS
WPA/WPA2
Quality of Service
11. Maximum length of data (Frame body) is 2304 when ____ is not in use
Client
802.11r
Diffraction
Encryption
12. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
CA - Collision avoidance
Fakeauth
13. an 802.11b 2.4GHz channel is how wide in MHz?
Access point
11
Three
22MHz wide
14. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
Acknowledgement frames
Unicast
Basic Service Set (BSS)
15. A station can act as a routing node in a wireless mesh network
Mesh
SSID (service set identifier)
Encryption
Greenfield mode
16. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
802.11n
WEP
Unencrypted
17. Aireplay-ng -0
Passive scan
2304 bytes
Management - control - data
Deauth
18. A service set identifier (SSID) has a maximum limit of how many characters?
ERP protection
Station (STA)
32
802.11g
19. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
CCMP
Dynamic Rate switching
Trojan/Rogue APs
32 character maximum and is case sensitive
20. 802.11 frames have a maximum 'upper-layer' payload of...
802.11r
2304 bytes
Personal mode and Enterprise Mode
Master
21. This type of authentication is essentially 'Null authentication'
Enter a username and password that will be central administered
Open system
802.11r
LTE
22. Beacons allow client devices to ____ for available LANS
Open system and Shared key
Trojan/Rogue APs
Passive scan
25 MHz
23. 802.11w can only be used in networks using_____
Service sets
Wavelength
WPA/WPA2
Master
24. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
AP radio
ARP spoofing
Wireless gateways
802.11b
25. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Open system and Shared key
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
4 channels
Passive scan
26. The Layer 2 frame will be...
Repeater
Unencrypted
Encryption
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
27. Collisions are detected through the use of....
Greenfield mode
Acknowledgement frames
AP radio
Wireless gateways
28. Which if the following organizations is responsible for standards compliance?
UNII
Wi-Fi Alliance
3
Unencrypted
29. High Throughput mode 0
Greenfield mode
Encryption
Indoor and outdoor
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
30. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
IPSec
Degradation
A VPN to the office network
802.11n
31. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Active mode
3
802.11a
OFDM
32. What item has an effect on RF line of site?
WPA2 -WEP
Obstacles
WPA/WPA2
0
33. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
AP to AP
Height of an RF signal
Antenna diversity
7
34. A pre-shared key mode may be vulnerable to a ____ attack
Authenticate - associate
Dictionary
Management - control - data
Height of an RF signal
35. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
Quality of Service
WPA Enterprise -WEP -MAC filters
PIN
36. In order to set up an ad hoc network a user must know which two parameters?
Spoof an address
802.11b
802.11n
SSID and Channel
37. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
Open system and Shared key
Residential and Enterprise
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
38. the amplitude of an RF signal is
Height of an RF signal
Small Office/Home Office Organizations (SOHO)
Basic Service Set (BSS)
Access point
39. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
4 channels
Active scanning
Access point
CCMP
40. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
802.11w
Deauth
Point-to-point link
41. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Trojan/Rogue APs
Interoperability testing organization
Monitor
42. Name two absolute measures of RF power
Trojan/Rogue APs
Other 802.11a devices
Watt and mW
Trojan/Rogue APs - Arp spoofing - DNS spoofing
43. Probe requests are used by clients as part of the ____ process
Refraction
DBi
Active scanning
Diffraction
44. 802.11b is capable of which data rates?
11
1
A VPN to the office network
1 - 5.5 and 11 Mbps
45. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
64-bit - 128-bit
802.11
BSSID (Basic Service Set identifier)
46. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Quality of Service
ERP protection
Repeater
ISM
47. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
PIN
LTE
CTS attacks - Deauth attack - Association flood - Jamming
Obstacles
48. This is the default mode that sets the card as a client that could then connect to an AP
Ad-Hoc
Managed
Indoor and outdoor
Repeater
49. The 802.11i amendment to the standard addresses which of the following technologies?
Security
Mismatched SSID
Interoperability testing organization
RC4
50. 802.11 uses CSMA/...
CCMP
CA - Collision avoidance
Dictionary
RC4
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests