SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Passphrase
SOHO brands that support WPS
RC4
Refraction
2. Collisions are detected through the use of....
Dynamic Rate switching
Master
Active mode
Acknowledgement frames
3. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Refraction
Residential and Enterprise
802.11b HR/DSSS and 802.11 DSSS
4. What is the gain of an antenna measured in
2.4-2.5GHz
DBi
FCC
Encryption
5. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
Wireless Game adapters and Media Bridges
7
802.11b HR/DSSS and 802.11 DSSS
6. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Open system
Unicast
Carefully plan a strategy using WEP and VLANs
ISM
7. In bluetooth - one master may communicate with up to ___ slaves in a piconet
HT fixed mode
3
RC4
7
8. What organization is responsible for unlicensed frequency band regulations in the United States?
2304 bytes
Roaming
FCC
Interference from a neighboring access point RF denial-of-service (Dos) attack
9. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Service sets
Encryption
Transmitter and receiver
10. The association process happens after which phase?
802.11i
Authentication
Repeater
Dictionary
11. WiMAX 802.16 authentication is based on...
SSID and Channel
X.509 certificates on the subscriber side only.
2.4-2.5GHz
3
12. Which function does RBAC provide?
Management - control - data
Security
Restricts access to authorized users
Root mode
13. 802.11 frames have a maximum 'upper-layer' payload of...
Data rate increases
Spoof an address
Managed
2304 bytes
14. an 802.11b 2.4GHz channel is how wide in MHz?
Independent
Client
22MHz wide
Active scanning
15. Typically a point-to-multipoint link consists of ____ connections
0
32
Three
Degradation
16. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
6 -12 - and 24 Mbps
Spoof an address
Active mode
HT fixed mode
17. 802.11w can only be used in networks using_____
WPA/WPA2
Extended Service Set (ESS)
WPA2
Transmitter and receiver
18. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
802.11n
ERP protection
Refraction
19. A service set identifier (SSID) has a maximum limit of how many characters?
Unencrypted
HT 20 MHz protection mode
32
802.11g
20. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Station (STA)
RTS/CTS
TKIP - optional RC4
Extended Service Set (ESS)
21. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Fake auth
Diffraction
Small Office/Home Office Organizations (SOHO)
Frequency
22. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
ARP spoofing
64-bit - 128-bit
6 -12 - and 24 Mbps
23. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Master
Diffraction
4 channels
64-bit - 128-bit
24. 802.11a uses which spread spectrum technology?
OFDM
802.11g
AES = CCMP required
802.11b
25. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Degradation
ARP spoofing
802.11n
Passve Scanning
26. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
HT fixed mode
Active mode
Dual radio APs
Antenna diversity
27. This is the default mode that sets the card as a client that could then connect to an AP
Managed
SSID (service set identifier)
HT Non member protection mode
14
28. Which process is a VPN solution intended to provide for users connection to a network
Acknowledgement frames
Master
Secure Layer 3 transmissions over a public network infrastructure
802.11r
29. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
SSID and Channel
Workgroup Bridge mode.
2.4-2.5GHz
30. Both ___ and ___ are wireless LAN security methods that support shared key security.
7
Dual radio APs
Dynamic Rate switching
WPA2 -WEP
31. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
AES = CCMP required
32
1 - 5.5 and 11 Mbps
LTE
32. According to the 802.11a amendment - which data rates are mandatory?
Root mode
FCC
6 -12 - and 24 Mbps
OFDM
33. A basic service set identifier (BSSID) is the MAC address of the ____
FCC
AP radio
Passive scan
Fakeauth
34. Name 3 channels considered non overlapping in the 2.4GHZ band
Mesh network
1 -6 -11
WPA2
Interoperability testing organization
35. 802.11b is capable of which data rates?
1 - 5.5 and 11 Mbps
64-bit - 128-bit
Workgroup Bridge mode.
Indoor and outdoor
36. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Know the SSID and enter it manually
Dictionary
Walled Garden.
37. Which items are unique to a service set identifier
Walled Garden.
25 MHz
Open system
32 character maximum and is case sensitive
38. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Service sets
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Diffraction
Reflection
39. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Independent
One or more
802.11r
Height of an RF signal
40. What type of algorithm does WPA use
Access point
TKIP - optional RC4
Open system
Point-to-point link
41. The capacity of an access point is dependent upon which factors?
802.11n
Number of users and software applications in use
FHSS
ISM
42. Bridge mode will not allow client associations and is ______ only
AP to AP
Managed
Authentication
Open system and Shared key
43. The Layer 2 frame will be...
CCMP
Unencrypted
Client
ERP-OFDM - DSSS
44. High Throughput mode 0
Management
Ad-Hoc
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Greenfield mode
45. ___ are used to describe the basic components and topology of a WLAN
HT 20 MHz protection mode
Service sets
Plaintext
MAC
46. Three types of passive WEP attacks
Wavelength
Authenticate - associate
Brute force - statistical and dictionary
Trojan/Rogue APs
47. 802.11 uses CSMA/...
Arp replay
CA - Collision avoidance
Degradation
1 - 5.5 and 11 Mbps
48. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Restricts access to authorized users
X.509 certificates on the subscriber side only.
Data rate increases
Station (STA)
49. A newly configured wireless intrusion prevention system will___
Passve Scanning
Greenfield mode
Automatically monitor the network for attacks
Single radio AP's
50. Wireless gateways come in two primary forms...
Residential and Enterprise
Transmitter and receiver
Fake auth
DBi