SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Station (STA)
802.11r
802.11a
Ad-Hoc
2. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
3. A weakness with MAC filtering is that it allows an intruder to ____
CTS attacks - Deauth attack - Association flood - Jamming
Active mode
Spoof an address
Walled Garden.
4. Which process is a VPN solution intended to provide for users connection to a network
Reflection
Carefully plan a strategy using WEP and VLANs
Addresses wireless Quality of Service
Secure Layer 3 transmissions over a public network infrastructure
5. What algorithm does WEP use
RC4
Open system
CTS attacks - Deauth attack - Association flood - Jamming
Managed
6. 3 types of frames
Management - control - data
SSID (service set identifier)
Addresses wireless Quality of Service
AP radio
7. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Mesh network
6 -12 - and 24 Mbps
Height of an RF signal
8. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
Wireless Game adapters and Media Bridges
UNII
Transmitter and receiver
9. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Unicast
Root mode
ERP protection
Extended Service Set (ESS)
10. Aireplay-ng -3
Arp
FHSS
Captive portal
802.11n
11. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
DBi
4 channels
Workgroup Bridge mode.
BSSID (Basic Service Set identifier)
12. An independent basic service set (IBSS) consists of how many access points?
Bridge mode
Two
0
TKIP - optional RC4
13. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Walled Garden.
Station (STA)
Trojan/Rogue APs - Arp spoofing - DNS spoofing
14. The Layer 2 frame will be...
802.11w
3
Other 802.11a devices
Unencrypted
15. This is the default mode that sets the card as a client that could then connect to an AP
Trojan/Rogue APs
Workgroup Bridge mode.
Three
Managed
16. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Know the SSID and enter it manually
Trojan/Rogue APs
1 -6 -11
RTS/CTS
17. What kind of Algorithm does WPA2 use?
AP to AP
WPA/WPA2
Semi directional and Highly directional
AES = CCMP required
18. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
2304 bytes
WEP
Mesh network
Station (STA)
19. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
TKIP - optional RC4
Mismatched SSID
Enter a username and password that will be central administered
20. Collisions are detected through the use of....
4 channels
Acknowledgement frames
Two
HT Non member protection mode
21. Beacons allow client devices to ____ for available LANS
Active mode
Know the SSID and enter it manually
Passive scan
Workgroup Bridge mode.
22. 802.11w can only be used in networks using_____
7
OFDM
WPA/WPA2
AP to AP
23. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
SSID (service set identifier)
Antenna diversity
Restricts access to authorized users
Managed
24. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
1 - 5.5 and 11 Mbps
Fake auth
Authentication
802.11b
25. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Two
Other 802.11a devices
Refraction
0
26. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Semi directional and Highly directional
ISM
Automatically monitor the network for attacks
27. Name two absolute measures of RF power
Personal mode and Enterprise Mode
Watt and mW
Independent
Trojan/Rogue APs - Arp spoofing - DNS spoofing
28. High Throughput mode 1
HT Non member protection mode
4 channels
OFDM
Wireless Game adapters and Media Bridges
29. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Active scanning
Walled Garden.
Addresses wireless Quality of Service
SSID (service set identifier)
30. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
Spoof an address
Wireless gateways
Fake auth
31. This is typically the 48-bit MAC address of the access point's radio card.
LTE
RC4
BSSID (Basic Service Set identifier)
Client
32. 802.11a uses which spread spectrum technology?
OFDM
40 bit
HT fixed mode
Point-to-point link
33. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
OFDM
4 channels
802.11a
802.11b HR/DSSS and 802.11 DSSS
34. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
Brute force - statistical and dictionary
MAC
Repeater
35. 3 types of antennas
2304 bytes
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Antenna diversity
802.11n
36. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Interoperability testing organization
Authenticate - associate
1 -6 -11
1 - 5.5 and 11 Mbps
37. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Refraction
Arp replay
Unencrypted
38. Name 3 channels considered non overlapping in the 2.4GHZ band
1 -6 -11
UNII
Monitor
Basic Service Set (BSS)
39. Probe requests are used by clients as part of the ____ process
CA - Collision avoidance
Single radio AP's
WEP
Active scanning
40. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
HT 20 MHz protection mode
4 channels
ARP spoofing
41. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
802.11b
Personal mode and Enterprise Mode
Number of users and software applications in use
Mesh
42. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Wireless Game adapters and Media Bridges
HT 20 MHz protection mode
Indoor and outdoor
A VPN to the office network
43. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Obstacles
WEP
802.11w
Residential and Enterprise
44. What item has an effect on RF line of site?
Obstacles
802.11w
Antenna diversity
SOHO brands that support WPS
45. Point to Point links typically use which antenna types?
SSID and Channel
AP radio
MAC
Semi directional and Highly directional
46. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
LTE
Three
Trojan/Rogue APs
Greenfield mode
47. The 802.11i amendment to the standard addresses which of the following technologies?
WPA2 -WEP
Basic Service Set (BSS)
Security
Reflection
48. In this mode a station can act as a relay or WLAN range extender
Walled Garden.
Repeater
Wi-Fi Alliance
LTE
49. WI-Fi Protected Setup was designed for which of the following wireless applications?
Enter a username and password that will be central administered
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Security
Small Office/Home Office Organizations (SOHO)
50. High Throughput mode 0
64-bit - 128-bit
CA - Collision avoidance
Access point
Greenfield mode