SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A station can act as a routing node in a wireless mesh network
Diffraction
Mesh
ISM
Independent
2. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
14
Open system and Shared key
Degradation
WPA2
3. Give two examples of WGB devices.
Semi directional and Highly directional
Interoperability testing organization
Wireless Game adapters and Media Bridges
Management
4. Wireless gateways come in two primary forms...
Residential and Enterprise
Dynamic Rate switching
Captive portal
Independent
5. Name two absolute measures of RF power
Management
7
Unicast
Watt and mW
6. Probe requests are used by clients as part of the ____ process
1 - 5.5 and 11 Mbps
Active scanning
Dynamic Rate switching
Interoperability testing organization
7. Name two relative measures of power
Walled Garden.
4 channels
32
DB and dBi
8. What kind of Algorithm does WPA2 use?
Monitor
AES = CCMP required
2.4-2.5GHz
Master
9. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
64-bit - 128-bit
Client
BSSID (Basic Service Set identifier)
10. 3 types of antennas
Open system and Shared key
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
CTS attacks - Deauth attack - Association flood - Jamming
RTS/CTS
11. What organization is responsible for unlicensed frequency band regulations in the United States?
DB and dBi
FCC
22MHz wide
802.11b
12. A basic service set (BSS) consists of how many access points
Extended Service Set (ESS)
1
802.11i
X.509 certificates on the subscriber side only.
13. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Passive scan
Antenna diversity
Dictionary
Arp replay
14. Which security methods do 802.11g access points support?
DB and dBi
Dual radio APs
WPA Enterprise -WEP -MAC filters
Two
15. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
22MHz wide
Arp replay
32 character maximum and is case sensitive
Arp
16. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
DB and dBi
14
Access point
Diffraction
17. High Throughput mode 1
HT Non member protection mode
Diffraction
Security
Bridge mode
18. What best describes the Wi-Fi alliance?
One or more
Data rate increases
32 character maximum and is case sensitive
Interoperability testing organization
19. What is regarded in 802.11e?
CA - Collision avoidance
Mesh network
Addresses wireless Quality of Service
Reflection
20. High throughput mode 2
HT 20 MHz protection mode
802.11i
Ad-Hoc
HT fixed mode
21. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Spoof an address
Passve Scanning
WEP
Wireless Game adapters and Media Bridges
22. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Height of an RF signal
HT fixed mode
802.11n
Interference from a neighboring access point RF denial-of-service (Dos) attack
23. The length of a WEP key is typically ___ or ___
Unencrypted
PIN
SSID (service set identifier)
64-bit - 128-bit
24. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
Transmitter and receiver
IPSec
OFDM
25. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Captive portal
LTE
Authenticate - associate
Access point
26. This is the default mode that sets the card as a client that could then connect to an AP
Managed
Watt and mW
DBi
Workgroup Bridge mode.
27. The 802.11g standard uses which two speed spectrum technologies.
Wireless gateways
ERP-OFDM - DSSS
RTS/CTS
Enter a username and password that will be central administered
28. Which items are unique to a service set identifier
UNII
32 character maximum and is case sensitive
Management
Service sets
29. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Monitor
4 channels
Access point
802.11b HR/DSSS and 802.11 DSSS
30. A brute force attack is limited to breaking___ WEP keys
Station (STA)
WPA Enterprise -WEP -MAC filters
40 bit
2.4-2.5GHz
31. The Access point can operate in a variety of modes...
HT Non member protection mode
Personal mode and Enterprise Mode
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Wireless Game adapters and Media Bridges
32. WiMAX 802.16 authentication is based on...
SSID and Channel
Trojan/Rogue APs - Arp spoofing - DNS spoofing
X.509 certificates on the subscriber side only.
Active scanning
33. This is a topology in which two or more APs are connected by a common distribution system.
Mismatched SSID
Extended Service Set (ESS)
6 -12 - and 24 Mbps
Monitor
34. Aireplay-ng -3
Arp
Passve Scanning
Data rate increases
802.11b
35. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
Degradation
Repeater
AP to AP
36. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Point-to-point link
Management - control - data
Service sets
37. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
0
Other 802.11a devices
MAC
802.11i
38. Maximum length of data (Frame body) is 2304 when ____ is not in use
1 -6 -11
6 -12 - and 24 Mbps
Encryption
802.11w
39. Name 3 channels considered non overlapping in the 2.4GHZ band
Independent
1 -6 -11
Service sets
HT 20 MHz protection mode
40. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
802.11b HR/DSSS and 802.11 DSSS
2.4-2.5GHz
802.11i
Refraction
41. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Management - control - data
Open system
Access point
AES = CCMP required
42. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
2.4-2.5GHz
Encryption
Bridge mode
Client
43. An Ack is expected for every____ frame transmitted
AP to AP
Unicast
Extended Service Set (ESS)
PIN
44. A basic service set identifier (BSSID) is the MAC address of the ____
Passphrase
WPA2
Open system and Shared key
AP radio
45. In this mode a station can act as a relay or WLAN range extender
WPA 2.0 personal and WPS
AP to AP
Automatically monitor the network for attacks
Repeater
46. A ______________ does not always use an omnidirectional antenna
40 bit
Passphrase
Master
Point-to-point link
47. the amplitude of an RF signal is
Height of an RF signal
Arp
OFDM
802.11i
48. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Antenna diversity
2304 bytes
Plaintext
Trojan/Rogue APs
49. Point to Point links typically use which antenna types?
Semi directional and Highly directional
Mesh network
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Watt and mW
50. ___ are used to describe the basic components and topology of a WLAN
FHSS
Repeater
Service sets
Mesh network