Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






2. WI-Fi Protected Setup was designed for which of the following wireless applications?






3. WiMAX 802.16 authentication is based on...






4. Give two examples of WGB devices.






5. These are user configurable and present in only five 802.11 frame types...






6. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






7. In this mode a station can act as a relay or WLAN range extender






8. A brute force attack is limited to breaking___ WEP keys






9. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






10. 802.11g LAN operates in what frequency range?






11. When a wireless LAN device listens for beacon frames - it is participating in which phase?






12. the amplitude of an RF signal is






13. Both ___ and ___ are wireless LAN security methods that support shared key security.






14. What two devices use RF to communicate






15. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






16. Which function does RBAC provide?






17. Management frames are sent in....






18. an 802.11b 2.4GHz channel is how wide in MHz?






19. Two authentication types defined in the 802.11 standard






20. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






21. 802.11 frames have a maximum 'upper-layer' payload of...






22. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






23. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






24. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






25. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






26. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






27. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






28. The association process happens after which phase?






29. What type of certification came from 802.11i






30. ____ is also known as the Protected management frame standard






31. A basic service set (BSS) consists of how many access points






32. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






33. Which if the following organizations is responsible for standards compliance?






34. Which security methods do 802.11g access points support?






35. According to the 802.11a amendment - which data rates are mandatory?






36. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


37. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






38. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






39. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






40. In this mode - the card acts as a normal access point






41. This type of authentication is essentially 'Null authentication'






42. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






43. What type of algorithm does WPA use






44. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






45. Bridge mode will not allow client associations and is ______ only






46. What best describes the Wi-Fi alliance?






47. Two characteristics of signals are






48. Point to Point links typically use which antenna types?






49. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






50. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity