SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Ad-Hoc
Repeater
AP radio
PIN
2. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Fake auth
ARP spoofing
64-bit - 128-bit
Antenna diversity
3. What is the gain of an antenna measured in
DBi
Access point
Security
TKIP - optional RC4
4. In this mode - the card acts as a normal access point
Captive portal
Master
Acknowledgement frames
0
5. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Bridge mode
Passphrase
Trojan/Rogue APs
6. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
802.11r
802.11b
Reflection
7. High throughput mode 2
HT 20 MHz protection mode
Carefully plan a strategy using WEP and VLANs
Arp
802.11i
8. The security amendment to the IEEE 802.11 standard requires ____
WPA 2.0 personal and WPS
Station (STA)
DB and dBi
CCMP
9. An Ack is expected for every____ frame transmitted
Passve Scanning
Know the SSID and enter it manually
Unicast
FHSS
10. 4 types of Denial of Service attacks
Ad-Hoc
32
CTS attacks - Deauth attack - Association flood - Jamming
BSSID (Basic Service Set identifier)
11. A pre-shared key mode may be vulnerable to a ____ attack
802.11w
WPA Enterprise -WEP -MAC filters
Dictionary
X.509 certificates on the subscriber side only.
12. 802.11 frames have a maximum 'upper-layer' payload of...
WPA2 -WEP
2304 bytes
Semi directional and Highly directional
Client
13. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
4 channels
802.11g
14. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
WPA/WPA2
802.11
Access point
Station (STA)
15. A basic service set identifier (BSSID) is the MAC address of the ____
WPA Enterprise -WEP -MAC filters
AP radio
TKIP - optional RC4
Quality of Service
16. What best describes the Wi-Fi alliance?
Interoperability testing organization
Master
Independent
Authentication
17. The open system authentication process uses how many frames?
Height of an RF signal
Two
Active mode
Number of users and software applications in use
18. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
Wavelength
64-bit - 128-bit
ARP spoofing
19. an 802.11b 2.4GHz channel is how wide in MHz?
CTS attacks - Deauth attack - Association flood - Jamming
22MHz wide
11
Arp replay
20. This is typically the 48-bit MAC address of the access point's radio card.
Repeater
Transmitter and receiver
AP radio
BSSID (Basic Service Set identifier)
21. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Mismatched SSID
DB and dBi
MAC
Indoor and outdoor
22. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Active mode
802.11r
Two
Enter a username and password that will be central administered
23. High Throughput mode 0
ERP-OFDM - DSSS
Number of users and software applications in use
Secure Layer 3 transmissions over a public network infrastructure
Greenfield mode
24. The 802.11i amendment to the standard addresses which of the following technologies?
Data rate increases
Security
802.11i
Watt and mW
25. Typically a point-to-multipoint link consists of ____ connections
802.11
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
One or more
Three
26. Collisions are detected through the use of....
Refraction
Acknowledgement frames
SSID and Channel
Open system
27. 802.11w can only be used in networks using_____
WPA/WPA2
Transmitter and receiver
PIN
AP radio
28. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Open system and Shared key
Point-to-point link
802.11b
Indoor and outdoor
29. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Mismatched SSID
Dynamic Rate switching
4 channels
802.11a
30. Two authentication types defined in the 802.11 standard
Open system and Shared key
Mesh network
Active scanning
Deauth
31. What is regarded in 802.11e?
802.11a
Semi directional and Highly directional
HT Non member protection mode
Addresses wireless Quality of Service
32. Name 3 channels considered non overlapping in the 2.4GHZ band
1 -6 -11
Dynamic Rate switching
WPA2 -WEP
TKIP - optional RC4
33. As a device moves away from an access point - what is true regarding dynamic rate switching?
Greenfield mode
Data rate increases
Spoof an address
Trojan/Rogue APs
34. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Passphrase
802.11r
Frequency
14
35. 3 types of antennas
802.11i
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Beacons - Probe request - Probe response - Association Request - Reassociation Request
WPA/WPA2
36. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
SSID (service set identifier)
802.11g
Plaintext
40 bit
37. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Fake auth
HT fixed mode
Interoperability testing organization
38. Which security methods do 802.11g access points support?
AP to AP
WPA Enterprise -WEP -MAC filters
Access point
Ad-Hoc
39. 802.11 uses CSMA/...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Dynamic Rate switching
CA - Collision avoidance
Secure Layer 3 transmissions over a public network infrastructure
40. In order to set up an ad hoc network a user must know which two parameters?
Data rate increases
Root mode
Mesh
SSID and Channel
41. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Deauth
Trojan/Rogue APs
Greenfield mode
WPA/WPA2
42. Management frames are sent in....
Repeater
Authentication
Restricts access to authorized users
Plaintext
43. ____ is also known as the Protected management frame standard
OFDM
Point-to-point link
802.11w
Client
44. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
CCMP
Active scanning
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Monitor
45. What type of certification came from 802.11i
WPA2
SOHO brands that support WPS
802.11g
One or more
46. A station can act as a routing node in a wireless mesh network
Mesh
Obstacles
Antenna diversity
Watt and mW
47. The 802.11g standard uses which two speed spectrum technologies.
ERP-OFDM - DSSS
Restricts access to authorized users
HT fixed mode
Access point
48. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
Personal mode and Enterprise Mode
Service sets
Obstacles
49. Bluetooth uses a radio technology called
Walled Garden.
FHSS
Restricts access to authorized users
RC4
50. This sets the card to participate in an independent basic service set
AP to AP
HT 20 MHz protection mode
Bridge mode
Ad-Hoc