SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A basic service set identifier (BSSID) is the MAC address of the ____
LTE
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
AP radio
32 character maximum and is case sensitive
2. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
40 bit
Know the SSID and enter it manually
Reflection
Personal mode and Enterprise Mode
3. An Ack is expected for every____ frame transmitted
Unicast
Mesh network
One or more
11
4. In this mode a station can act as a relay or WLAN range extender
Repeater
One or more
1 -6 -11
32 character maximum and is case sensitive
5. Which items are unique to a service set identifier
WEP
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Management - control - data
32 character maximum and is case sensitive
6. What kind of Algorithm does WPA2 use?
Single radio AP's
AES = CCMP required
DB and dBi
SSID (service set identifier)
7. What item has an effect on RF line of site?
IPSec
Obstacles
3
Wi-Fi Alliance
8. the amplitude of an RF signal is
Height of an RF signal
Repeater
Refraction
MAC
9. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Trojan/Rogue APs
Mismatched SSID
Obstacles
Access point
10. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
SOHO brands that support WPS
Deauth
ISM
CA - Collision avoidance
11. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11w
X.509 certificates on the subscriber side only.
802.11
802.11n
12. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Independent
Active mode
0
Arp replay
13. 3 types of antennas
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Other 802.11a devices
7
DB and dBi
14. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Walled Garden.
802.11g
Frequency
Fakeauth
15. What type of wireless network device is PIN-based security most commonly used with
CA - Collision avoidance
Repeater
32 character maximum and is case sensitive
SOHO brands that support WPS
16. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
OFDM
SSID (service set identifier)
Know the SSID and enter it manually
17. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Dynamic Rate switching
DB and dBi
2.4-2.5GHz
18. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
AES = CCMP required
Mesh network
One or more
Wavelength
19. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
802.11b
SOHO brands that support WPS
20. Aireplay-ng -1
Fakeauth
Station (STA)
CTS attacks - Deauth attack - Association flood - Jamming
Number of users and software applications in use
21. 802.11b is capable of which data rates?
Mismatched SSID
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
1 - 5.5 and 11 Mbps
CCMP
22. High throughput mode 2
UNII
HT 20 MHz protection mode
MAC
32 character maximum and is case sensitive
23. Name 3 channels considered non overlapping in the 2.4GHZ band
TKIP - optional RC4
One or more
1 -6 -11
Repeater
24. Collisions are detected through the use of....
Refraction
HT 20 MHz protection mode
Acknowledgement frames
Beacons - Probe request - Probe response - Association Request - Reassociation Request
25. WI-Fi Protected Setup was designed for which of the following wireless applications?
RC4
Frequency
Small Office/Home Office Organizations (SOHO)
Wireless gateways
26. A brute force attack is limited to breaking___ WEP keys
7
40 bit
Service sets
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
27. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
X.509 certificates on the subscriber side only.
Arp replay
64-bit - 128-bit
28. This is typically the 48-bit MAC address of the access point's radio card.
Interoperability testing organization
Enter a username and password that will be central administered
Point-to-point link
BSSID (Basic Service Set identifier)
29. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Plaintext
MAC
22MHz wide
30. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
LTE
FCC
Passive scan
Quality of Service
31. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Authenticate - associate
802.11
Refraction
Spoof an address
32. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
PIN
Residential and Enterprise
Carefully plan a strategy using WEP and VLANs
Basic Service Set (BSS)
33. What algorithm does WEP use
Fake auth
Residential and Enterprise
RC4
X.509 certificates on the subscriber side only.
34. 4 types of Denial of Service attacks
Client
802.11b HR/DSSS and 802.11 DSSS
CTS attacks - Deauth attack - Association flood - Jamming
Addresses wireless Quality of Service
35. Bridge mode will not allow client associations and is ______ only
Automatically monitor the network for attacks
Greenfield mode
MAC
AP to AP
36. A station can act as a routing node in a wireless mesh network
DBi
Mesh
Unicast
Passphrase
37. Two characteristics of signals are
WPA/WPA2
OFDM
Amplitude and phase
Greenfield mode
38. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
7
Security
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
39. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Security
ARP spoofing
Degradation
Independent
40. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Workgroup Bridge mode.
Roaming
Transmitter and receiver
41. The association process happens after which phase?
LTE
Independent
Authentication
CCMP
42. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Unicast
Enter a username and password that will be central administered
802.11b HR/DSSS and 802.11 DSSS
Wireless gateways
43. In order to set up an ad hoc network a user must know which two parameters?
Arp
802.11b
SSID and Channel
Dual radio APs
44. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Passphrase
UNII
Workgroup Bridge mode.
Antenna diversity
45. What two devices use RF to communicate
802.11w
2.4-2.5GHz
Transmitter and receiver
Height of an RF signal
46. Point to Point links typically use which antenna types?
Access point
Arp
Semi directional and Highly directional
Walled Garden.
47. The 802.11g standard uses which two speed spectrum technologies.
Service sets
ERP-OFDM - DSSS
Dual radio APs
Trojan/Rogue APs
48. A ______________ does not always use an omnidirectional antenna
Spoof an address
A VPN to the office network
Point-to-point link
LTE
49. What is the gain of an antenna measured in
TKIP - optional RC4
Monitor
Walled Garden.
DBi
50. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
ISM
0
UNII