SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Frequency
Wavelength
WEP
WPA2
2. Name two absolute measures of RF power
Data rate increases
Indoor and outdoor
Watt and mW
Diffraction
3. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Encryption
Bridge mode
1 -6 -11
4. When an RF signal bounces off a smooth non absorptive surface - the behavior is
ARP spoofing
Quality of Service
Reflection
Security
5. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
TKIP - optional RC4
RTS/CTS
Managed
Access point
6. Which security methods do 802.11g access points support?
CA - Collision avoidance
802.11r
Deauth
WPA Enterprise -WEP -MAC filters
7. This sets the card to participate in an independent basic service set
Captive portal
OFDM
802.11g
Ad-Hoc
8. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Access point
Bridge mode
Interoperability testing organization
Antenna diversity
9. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
2.4-2.5GHz
A VPN to the office network
Trojan/Rogue APs
802.11w
10. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. Two authentication types defined in the 802.11 standard
Open system and Shared key
Diffraction
ERP-OFDM - DSSS
Captive portal
12. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
HT Non member protection mode
LTE
Interference from a neighboring access point RF denial-of-service (Dos) attack
Ad-Hoc
13. 802.11a uses which spread spectrum technology?
Mesh
OFDM
SSID and Channel
32
14. 802.11 uses CSMA/...
802.11r
Station (STA)
Quality of Service
CA - Collision avoidance
15. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Active scanning
1 - 5.5 and 11 Mbps
Monitor
Repeater
16. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Security
Dual radio APs
Personal mode and Enterprise Mode
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
17. This is the default mode that sets the card as a client that could then connect to an AP
ISM
Managed
WEP
25 MHz
18. 802.11g LAN operates in what frequency range?
Single radio AP's
TKIP - optional RC4
Dual radio APs
2.4-2.5GHz
19. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Residential and Enterprise
WPA2
HT 20 MHz protection mode
Personal mode and Enterprise Mode
20. A brute force attack is limited to breaking___ WEP keys
Spoof an address
Antenna diversity
802.11a
40 bit
21. 802.11 frames have a maximum 'upper-layer' payload of...
Management - control - data
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Restricts access to authorized users
2304 bytes
22. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
802.11g
MAC
Mesh
23. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
HT 20 MHz protection mode
ERP protection
Walled Garden.
Wireless Game adapters and Media Bridges
24. Three types of passive WEP attacks
Amplitude and phase
WPA2 -WEP
Semi directional and Highly directional
Brute force - statistical and dictionary
25. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
802.11n
Obstacles
4 channels
ARP spoofing
26. The security amendment to the IEEE 802.11 standard requires ____
Independent
Brute force - statistical and dictionary
CCMP
Open system and Shared key
27. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
One or more
PIN
11
Interference from a neighboring access point RF denial-of-service (Dos) attack
28. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
802.11a
Carefully plan a strategy using WEP and VLANs
X.509 certificates on the subscriber side only.
SSID and Channel
29. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
4 channels
1 - 5.5 and 11 Mbps
Root mode
30. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Spoof an address
SSID and Channel
802.11n
Watt and mW
31. What item has an effect on RF line of site?
ARP spoofing
Obstacles
Single radio AP's
Interference from a neighboring access point RF denial-of-service (Dos) attack
32. As a device moves away from an access point - what is true regarding dynamic rate switching?
32 character maximum and is case sensitive
32
Passphrase
Data rate increases
33. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
Point-to-point link
11
32 character maximum and is case sensitive
34. The 802.11i amendment to the standard addresses which of the following technologies?
ERP protection
Security
Spoof an address
Passphrase
35. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Semi directional and Highly directional
Basic Service Set (BSS)
Open system and Shared key
802.11b HR/DSSS and 802.11 DSSS
36. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Plaintext
LTE
Diffraction
802.11g
37. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Residential and Enterprise
Enter a username and password that will be central administered
6 -12 - and 24 Mbps
14
38. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Management - control - data
Other 802.11a devices
Service sets
Roaming
39. the amplitude of an RF signal is
Transmitter and receiver
6 -12 - and 24 Mbps
Refraction
Height of an RF signal
40. 3 types of antennas
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Client
Carefully plan a strategy using WEP and VLANs
CTS attacks - Deauth attack - Association flood - Jamming
41. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Passphrase
7
Management
Point-to-point link
42. What algorithm does WEP use
LTE
RC4
ARP spoofing
Open system
43. 3 types of frames
Open system
Restricts access to authorized users
6 -12 - and 24 Mbps
Management - control - data
44. Typically a point-to-multipoint link consists of ____ connections
Three
Arp
HT fixed mode
Unencrypted
45. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
FHSS
Know the SSID and enter it manually
Open system and Shared key
46. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
32
Wireless Game adapters and Media Bridges
Trojan/Rogue APs
47. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
Managed
Security
0
48. A basic service set (BSS) consists of how many access points
1 - 5.5 and 11 Mbps
Management
1
FHSS
49. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Wavelength
WPA2 -WEP
3
IPSec
50. This is typically the 48-bit MAC address of the access point's radio card.
Monitor
Wavelength
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
BSSID (Basic Service Set identifier)