SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
802.11w
Brute force - statistical and dictionary
WPA/WPA2
2. The Layer 2 frame will be...
X.509 certificates on the subscriber side only.
Reflection
Management
Unencrypted
3. Maximum length of data (Frame body) is 2304 when ____ is not in use
OFDM
1
Encryption
ERP-OFDM - DSSS
4. A service set identifier (SSID) has a maximum limit of how many characters?
Roaming
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
32
802.11b HR/DSSS and 802.11 DSSS
5. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Semi directional and Highly directional
802.11b
Watt and mW
Basic Service Set (BSS)
6. Name two relative measures of power
Automatically monitor the network for attacks
BSSID (Basic Service Set identifier)
AP to AP
DB and dBi
7. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
Management - control - data
1 -6 -11
MAC
8. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Obstacles
Quality of Service
Management - control - data
64-bit - 128-bit
9. When RF passes or bends around an obstacle such as a building or column - the behavior is
Enter a username and password that will be central administered
Repeater
Diffraction
Authenticate - associate
10. What type of wireless network device is PIN-based security most commonly used with
802.11i
X.509 certificates on the subscriber side only.
802.11b HR/DSSS and 802.11 DSSS
SOHO brands that support WPS
11. Which data encryption.authentication method is identified in the IEEE 802.11 standard
WEP
LTE
Antenna diversity
Independent
12. The 802.11i amendment to the standard addresses which of the following technologies?
Indoor and outdoor
Access point
Secure Layer 3 transmissions over a public network infrastructure
Security
13. 4 types of Denial of Service attacks
ISM
25 MHz
CTS attacks - Deauth attack - Association flood - Jamming
AP to AP
14. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Authenticate - associate
Extended Service Set (ESS)
Transmitter and receiver
SOHO brands that support WPS
15. What kind of Algorithm does WPA2 use?
0
14
AES = CCMP required
IPSec
16. This type of authentication is essentially 'Null authentication'
Transmitter and receiver
Open system
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Passive scan
17. A station can act as a routing node in a wireless mesh network
Mesh
32 character maximum and is case sensitive
Management - control - data
CA - Collision avoidance
18. Typically a point-to-multipoint link consists of ____ connections
Three
25 MHz
Deauth
Bridge mode
19. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Encryption
Client
64-bit - 128-bit
Wireless gateways
20. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
Point-to-point link
Quality of Service
Trojan/Rogue APs - Arp spoofing - DNS spoofing
21. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
32
Interference from a neighboring access point RF denial-of-service (Dos) attack
WPA/WPA2
Three
22. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
802.11a
Wireless Game adapters and Media Bridges
Mesh network
23. In repeater mode - the repeater device connects to a normal '___ mode'
Fake auth
Extended Service Set (ESS)
Root mode
Security
24. Which if the following organizations is responsible for standards compliance?
Ad-Hoc
Open system
Wi-Fi Alliance
One or more
25. High throughput mode 2
64-bit - 128-bit
HT 20 MHz protection mode
Amplitude and phase
Spoof an address
26. Collisions are detected through the use of....
Acknowledgement frames
Independent
CCMP
HT 20 MHz protection mode
27. Management frames are sent in....
Authentication
Acknowledgement frames
Plaintext
Repeater
28. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
Trojan/Rogue APs
Greenfield mode
Open system
29. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
A VPN to the office network
40 bit
Management
Semi directional and Highly directional
30. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
SSID (service set identifier)
Two
Basic Service Set (BSS)
Active scanning
31. A weakness with MAC filtering is that it allows an intruder to ____
802.11i
Spoof an address
Secure Layer 3 transmissions over a public network infrastructure
Client
32. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
Plaintext
802.11i
7
33. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Monitor
Access point
Basic Service Set (BSS)
Unencrypted
34. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Frequency
Monitor
Personal mode and Enterprise Mode
Watt and mW
35. Name two absolute measures of RF power
Passive scan
Fake auth
AP radio
Watt and mW
36. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
6 -12 - and 24 Mbps
MAC
UNII
X.509 certificates on the subscriber side only.
37. A pre-shared key mode may be vulnerable to a ____ attack
Three
A VPN to the office network
3
Dictionary
38. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Quality of Service
4 channels
Active mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
39. What item has an effect on RF line of site?
Root mode
AES = CCMP required
Obstacles
1 - 5.5 and 11 Mbps
40. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Access point
CCMP
14
WPA2
42. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
Two
Mesh network
Number of users and software applications in use
43. Which process is a VPN solution intended to provide for users connection to a network
Unencrypted
Management
AP radio
Secure Layer 3 transmissions over a public network infrastructure
44. What type of algorithm does WPA use
TKIP - optional RC4
Reflection
Managed
7
45. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
UNII
WPA2
Mismatched SSID
802.11r
46. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
MAC
ISM
RTS/CTS
AP to AP
47. An Ack is expected for every____ frame transmitted
Antenna diversity
BSSID (Basic Service Set identifier)
Unicast
Station (STA)
48. Aireplay-ng -1
Fakeauth
Diffraction
Deauth
Beacons - Probe request - Probe response - Association Request - Reassociation Request
49. Which security methods do 802.11g access points support?
DB and dBi
Spoof an address
WPA Enterprise -WEP -MAC filters
64-bit - 128-bit
50. 802.11g LAN operates in what frequency range?
LTE
Independent
Beacons - Probe request - Probe response - Association Request - Reassociation Request
2.4-2.5GHz