Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. an 802.11b 2.4GHz channel is how wide in MHz?






2. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






3. A newly configured wireless intrusion prevention system will___






4. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






5. In bluetooth - one master may communicate with up to ___ slaves in a piconet






6. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






7. What kind of Algorithm does WPA2 use?






8. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






9. Which process is a VPN solution intended to provide for users connection to a network






10. In this mode a station can act as a relay or WLAN range extender






11. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






12. Aireplay-ng -3






13. This type of authentication is essentially 'Null authentication'






14. A pre-shared key mode may be vulnerable to a ____ attack






15. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






16. When an RF signal bounces off a smooth non absorptive surface - the behavior is






17. An independent basic service set (IBSS) consists of how many access points?






18. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...






19. Which function does RBAC provide?






20. A station can act as a routing node in a wireless mesh network






21. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


22. High Throughput mode 1






23. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






24. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






25. 802.11 uses CSMA/...






26. A weakness with MAC filtering is that it allows an intruder to ____






27. Point to Point links typically use which antenna types?






28. The 802.11g standard uses which two speed spectrum technologies.






29. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






30. In repeater mode - the repeater device connects to a normal '___ mode'






31. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






32. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






33. A ______________ does not always use an omnidirectional antenna






34. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






35. What organization is responsible for unlicensed frequency band regulations in the United States?






36. What two devices use RF to communicate






37. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






38. The length of a WEP key is typically ___ or ___






39. Two authentication types defined in the 802.11 standard






40. An Ack is expected for every____ frame transmitted






41. The association process happens after which phase?






42. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






43. What is regarded in 802.11e?






44. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






45. Name 3 channels considered non overlapping in the 2.4GHZ band






46. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






47. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






48. 802.11a uses which spread spectrum technology?






49. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






50. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?