SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
1 - 5.5 and 11 Mbps
Amplitude and phase
32 character maximum and is case sensitive
2. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
SSID (service set identifier)
RTS/CTS
Captive portal
802.11
3. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Fakeauth
CTS attacks - Deauth attack - Association flood - Jamming
Frequency
Antenna diversity
4. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
TKIP - optional RC4
802.11g
X.509 certificates on the subscriber side only.
14
5. Name 3 channels considered non overlapping in the 2.4GHZ band
Acknowledgement frames
Number of users and software applications in use
1 -6 -11
Authentication
6. What type of wireless network device is PIN-based security most commonly used with
Point-to-point link
SOHO brands that support WPS
RTS/CTS
Trojan/Rogue APs
7. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
RTS/CTS
Enter a username and password that will be central administered
IPSec
Station (STA)
8. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
802.11w
802.11g
11
FHSS
9. Name two absolute measures of RF power
Automatically monitor the network for attacks
FCC
Watt and mW
802.11r
10. The Access point can operate in a variety of modes...
802.11b
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
X.509 certificates on the subscriber side only.
WPA 2.0 personal and WPS
11. 3 types of antennas
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
4 channels
Walled Garden.
1
12. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
Single radio AP's
25 MHz
11
13. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
RC4
Mesh network
Walled Garden.
Frequency
14. Which process is a VPN solution intended to provide for users connection to a network
Fakeauth
Security
IPSec
Secure Layer 3 transmissions over a public network infrastructure
15. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Watt and mW
ERP-OFDM - DSSS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Restricts access to authorized users
16. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Access point
Arp
BSSID (Basic Service Set identifier)
Carefully plan a strategy using WEP and VLANs
17. Probe requests are used by clients as part of the ____ process
Transmitter and receiver
AP radio
FCC
Active scanning
18. What algorithm does WEP use
RC4
Antenna diversity
SSID (service set identifier)
Monitor
19. What best describes the Wi-Fi alliance?
TKIP - optional RC4
Interoperability testing organization
Encryption
Semi directional and Highly directional
20. The radio card can operate in one of up to six possible modes of operation...
802.11w
Trojan/Rogue APs
RC4
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
21. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
SSID (service set identifier)
7
Amplitude and phase
22. Which security methods do 802.11g access points support?
Automatically monitor the network for attacks
Walled Garden.
LTE
WPA Enterprise -WEP -MAC filters
23. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
SOHO brands that support WPS
Access point
3
HT 20 MHz protection mode
24. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
7
40 bit
Independent
Antenna diversity
25. In order to set up an ad hoc network a user must know which two parameters?
ERP protection
SSID and Channel
Active scanning
802.11n
26. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
32
FCC
Quality of Service
ARP spoofing
27. Bluetooth uses a radio technology called
Extended Service Set (ESS)
FHSS
Transmitter and receiver
Encryption
28. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Reflection
Secure Layer 3 transmissions over a public network infrastructure
Unicast
29. What kind of Algorithm does WPA2 use?
A VPN to the office network
AES = CCMP required
FHSS
CTS attacks - Deauth attack - Association flood - Jamming
30. Bridge mode will not allow client associations and is ______ only
802.11r
802.11b HR/DSSS and 802.11 DSSS
AP to AP
Active mode
31. WI-Fi Protected Setup was designed for which of the following wireless applications?
Diffraction
Small Office/Home Office Organizations (SOHO)
AP to AP
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
32. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Wi-Fi Alliance
Know the SSID and enter it manually
Fakeauth
Mismatched SSID
33. The association process happens after which phase?
Authentication
Semi directional and Highly directional
Dual radio APs
HT 20 MHz protection mode
34. A ______________ does not always use an omnidirectional antenna
WPA/WPA2
Point-to-point link
Open system
Service sets
35. The capacity of an access point is dependent upon which factors?
Restricts access to authorized users
Personal mode and Enterprise Mode
PIN
Number of users and software applications in use
36. an 802.11b 2.4GHz channel is how wide in MHz?
22MHz wide
Refraction
Wireless gateways
802.11g
37. Layer 2 Tunneling Protocol commonly uses which encryption method?
Management - control - data
Independent
Two
IPSec
38. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
802.11g
Independent
FCC
ERP protection
39. What item has an effect on RF line of site?
Roaming
FHSS
Know the SSID and enter it manually
Obstacles
40. Name two relative measures of power
802.11a
Ad-Hoc
DB and dBi
Bridge mode
41. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Authenticate - associate
SSID and Channel
Watt and mW
802.11
42. A newly configured wireless intrusion prevention system will___
0
Workgroup Bridge mode.
Automatically monitor the network for attacks
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
43. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
14
MAC
802.11n
Frequency
44. High Throughput mode 1
802.11a
Access point
Transmitter and receiver
HT Non member protection mode
45. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
Wireless Game adapters and Media Bridges
One or more
Two
46. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
2304 bytes
WPA/WPA2
One or more
Fake auth
47. A basic service set (BSS) consists of how many access points
Residential and Enterprise
Brute force - statistical and dictionary
1
AP radio
48. What type of algorithm does WPA use
Management - control - data
DBi
TKIP - optional RC4
BSSID (Basic Service Set identifier)
49. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Basic Service Set (BSS)
Active scanning
0
Access point
50. The 802.11i amendment to the standard addresses which of the following technologies?
Passve Scanning
Security
1 - 5.5 and 11 Mbps
Repeater