Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -3






2. The 802.11g standard uses which two speed spectrum technologies.






3. As a device moves away from an access point - what is true regarding dynamic rate switching?






4. The association process happens after which phase?






5. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






6. WI-Fi Protected Setup was designed for which of the following wireless applications?






7. Three types of MITM attacks






8. ___ are used to describe the basic components and topology of a WLAN






9. What is the gain of an antenna measured in






10. In this mode - the card acts as a normal access point






11. 4 types of Denial of Service attacks






12. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






13. 802.11b is capable of which data rates?






14. an 802.11b 2.4GHz channel is how wide in MHz?






15. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






16. Beacons allow client devices to ____ for available LANS






17. 802.11a uses which spread spectrum technology?






18. In order to set up an ad hoc network a user must know which two parameters?






19. High Throughput mode 1






20. Which if the following organizations is responsible for standards compliance?






21. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






22. An Ack is expected for every____ frame transmitted






23. 3 types of frames






24. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






25. Which security feature provides the strongest security for a home-based wireless network?






26. Collisions are detected through the use of....






27. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






28. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






29. 802.11g LAN operates in what frequency range?






30. What algorithm does WEP use






31. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






32. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






33. A brute force attack is limited to breaking___ WEP keys






34. In bluetooth - one master may communicate with up to ___ slaves in a piconet






35. This type of authentication is essentially 'Null authentication'






36. The Access point can operate in a variety of modes...






37. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






38. Maximum length of data (Frame body) is 2304 when ____ is not in use






39. Bridge mode will not allow client associations and is ______ only






40. The Layer 2 frame will be...






41. A station can act as a routing node in a wireless mesh network






42. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






43. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






44. What organization is responsible for unlicensed frequency band regulations in the United States?






45. High Throughput mode 0






46. Point to Point links typically use which antenna types?






47. This sets the card to participate in an independent basic service set






48. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






49. Which function does RBAC provide?






50. Both ___ and ___ are wireless LAN security methods that support shared key security.