SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Active scanning
802.11a
Two
Trojan/Rogue APs - Arp spoofing - DNS spoofing
2. 802.11 frames have a maximum 'upper-layer' payload of...
Workgroup Bridge mode.
Acknowledgement frames
2304 bytes
802.11b
3. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Interoperability testing organization
SSID (service set identifier)
Monitor
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
4. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Bridge mode
SSID (service set identifier)
Dynamic Rate switching
5. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. What type of wireless network device is PIN-based security most commonly used with
CTS attacks - Deauth attack - Association flood - Jamming
SOHO brands that support WPS
Data rate increases
Three
7. Bridge mode will not allow client associations and is ______ only
Frequency
32 character maximum and is case sensitive
AP to AP
Brute force - statistical and dictionary
8. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Interference from a neighboring access point RF denial-of-service (Dos) attack
32
Dictionary
9. Aireplay-ng -3
11
Basic Service Set (BSS)
Arp
Authentication
10. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
Small Office/Home Office Organizations (SOHO)
Active scanning
25 MHz
11. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
2.4-2.5GHz
Wireless Game adapters and Media Bridges
Quality of Service
12. Maximum length of data (Frame body) is 2304 when ____ is not in use
BSSID (Basic Service Set identifier)
Repeater
2.4-2.5GHz
Encryption
13. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
RTS/CTS
4 channels
Acknowledgement frames
14. When RF passes or bends around an obstacle such as a building or column - the behavior is
Spoof an address
802.11g
Diffraction
32
15. 802.11a uses which spread spectrum technology?
OFDM
0
Management
Transmitter and receiver
16. ____ is also known as the Protected management frame standard
Wireless Game adapters and Media Bridges
802.11w
64-bit - 128-bit
Service sets
17. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Walled Garden.
802.11r
802.11a
802.11g
18. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Arp replay
802.11n
Two
Watt and mW
19. The security amendment to the IEEE 802.11 standard requires ____
CCMP
Unicast
Know the SSID and enter it manually
Dictionary
20. Bluetooth uses a radio technology called
802.11n
FHSS
Unicast
Know the SSID and enter it manually
21. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Client
Workgroup Bridge mode.
Management
Wavelength
22. Typically a point-to-multipoint link consists of ____ connections
ISM
RC4
CTS attacks - Deauth attack - Association flood - Jamming
Three
23. Both ___ and ___ are wireless LAN security methods that support shared key security.
Passive scan
Reflection
WPA2 -WEP
802.11w
24. What type of certification came from 802.11i
WPA2
Passphrase
HT 20 MHz protection mode
Walled Garden.
25. A newly configured wireless intrusion prevention system will___
Transmitter and receiver
Mismatched SSID
Captive portal
Automatically monitor the network for attacks
26. A station can act as a routing node in a wireless mesh network
Managed
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Mesh
802.11n
27. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Root mode
Antenna diversity
2.4-2.5GHz
MAC
28. A weakness with MAC filtering is that it allows an intruder to ____
Transmitter and receiver
TKIP - optional RC4
Independent
Spoof an address
29. This sets the card to participate in an independent basic service set
Data rate increases
Ad-Hoc
Wireless Game adapters and Media Bridges
MAC
30. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
0
1 - 5.5 and 11 Mbps
LTE
4 channels
31. Wireless gateways come in two primary forms...
Restricts access to authorized users
Residential and Enterprise
22MHz wide
Arp
32. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Service sets
40 bit
802.11g
Bridge mode
33. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
2.4-2.5GHz
Acknowledgement frames
WPA 2.0 personal and WPS
Management
34. 3 types of frames
A VPN to the office network
Automatically monitor the network for attacks
SSID and Channel
Management - control - data
35. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Arp replay
DB and dBi
WPA2
36. These are user configurable and present in only five 802.11 frame types...
WPA Enterprise -WEP -MAC filters
Unicast
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Station (STA)
37. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
X.509 certificates on the subscriber side only.
Repeater
Unencrypted
DB and dBi
38. Point to Point links typically use which antenna types?
Semi directional and Highly directional
Ad-Hoc
Extended Service Set (ESS)
Greenfield mode
39. Aireplay-ng -1
Fakeauth
Brute force - statistical and dictionary
Wavelength
HT fixed mode
40. The Layer 2 frame will be...
Repeater
Authenticate - associate
WEP
Unencrypted
41. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Unicast
802.11r
Roaming
Fake auth
42. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Mesh network
Repeater
Secure Layer 3 transmissions over a public network infrastructure
Personal mode and Enterprise Mode
43. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Secure Layer 3 transmissions over a public network infrastructure
Security
CCMP
RTS/CTS
44. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Captive portal
ISM
Quality of Service
Passve Scanning
45. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
IPSec
TKIP - optional RC4
ISM
2304 bytes
46. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Quality of Service
Mismatched SSID
Three
802.11i
47. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
UNII
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Service sets
48. Which security methods do 802.11g access points support?
802.11
2304 bytes
WPA Enterprise -WEP -MAC filters
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
49. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
Management
1
AES = CCMP required
50. the amplitude of an RF signal is
Management
Height of an RF signal
Management - control - data
Monitor