SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Access point can operate in a variety of modes...
Managed
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
1 -6 -11
Management - control - data
2. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
SOHO brands that support WPS
Enter a username and password that will be central administered
Independent
3. What best describes the Wi-Fi alliance?
Three
Interoperability testing organization
Watt and mW
Automatically monitor the network for attacks
4. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
SSID (service set identifier)
25 MHz
Carefully plan a strategy using WEP and VLANs
Unencrypted
5. Two characteristics of signals are
Authentication
Small Office/Home Office Organizations (SOHO)
Amplitude and phase
WEP
6. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Ad-Hoc
Monitor
ERP-OFDM - DSSS
7. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Know the SSID and enter it manually
Captive portal
Addresses wireless Quality of Service
Antenna diversity
8. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
HT fixed mode
Fake auth
Brute force - statistical and dictionary
802.11n
9. Bluetooth uses a radio technology called
802.11b HR/DSSS and 802.11 DSSS
FHSS
Mesh network
Automatically monitor the network for attacks
10. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Semi directional and Highly directional
Watt and mW
UNII
Roaming
11. What two devices use RF to communicate
Captive portal
Refraction
Transmitter and receiver
Interoperability testing organization
12. A weakness with MAC filtering is that it allows an intruder to ____
2304 bytes
Spoof an address
3
6 -12 - and 24 Mbps
13. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Watt and mW
Dual radio APs
Ad-Hoc
3
14. Which function does RBAC provide?
Basic Service Set (BSS)
Restricts access to authorized users
Degradation
CTS attacks - Deauth attack - Association flood - Jamming
15. A basic service set (BSS) consists of how many access points
Personal mode and Enterprise Mode
WPA2 -WEP
TKIP - optional RC4
1
16. 3 types of frames
Reflection
Dynamic Rate switching
WPA/WPA2
Management - control - data
17. A station can act as a routing node in a wireless mesh network
TKIP - optional RC4
802.11b
Passive scan
Mesh
18. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Walled Garden.
AP to AP
Arp replay
19. 3 types of antennas
802.11r
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Security
1 -6 -11
20. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
Small Office/Home Office Organizations (SOHO)
UNII
Wireless Game adapters and Media Bridges
21. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
802.11n
One or more
Other 802.11a devices
WPA Enterprise -WEP -MAC filters
22. In repeater mode - the repeater device connects to a normal '___ mode'
Trojan/Rogue APs
MAC
Root mode
Management - control - data
23. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Unicast
LTE
Carefully plan a strategy using WEP and VLANs
Bridge mode
24. What type of certification came from 802.11i
WPA2
7
1 -6 -11
Two
25. 802.11w can only be used in networks using_____
1
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
WPA/WPA2
Mesh
26. High throughput mode 2
ERP-OFDM - DSSS
Captive portal
HT 20 MHz protection mode
Plaintext
27. 4 types of Denial of Service attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
CTS attacks - Deauth attack - Association flood - Jamming
Point-to-point link
Secure Layer 3 transmissions over a public network infrastructure
28. 802.11 frames have a maximum 'upper-layer' payload of...
Roaming
802.11a
Root mode
2304 bytes
29. What algorithm does WEP use
Know the SSID and enter it manually
6 -12 - and 24 Mbps
RC4
Open system
30. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
31. The length of a WEP key is typically ___ or ___
Arp replay
Small Office/Home Office Organizations (SOHO)
64-bit - 128-bit
Open system and Shared key
32. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Interference from a neighboring access point RF denial-of-service (Dos) attack
Arp
14
FHSS
33. Which security methods do 802.11g access points support?
PIN
Monitor
Mesh network
WPA Enterprise -WEP -MAC filters
34. Three types of MITM attacks
Spoof an address
Addresses wireless Quality of Service
Trojan/Rogue APs - Arp spoofing - DNS spoofing
ERP protection
35. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Secure Layer 3 transmissions over a public network infrastructure
Access point
One or more
36. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
UNII
Enter a username and password that will be central administered
Repeater
Fake auth
37. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
Open system
WPA2 -WEP
Access point
38. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Two
Degradation
Fakeauth
802.11i
39. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Mesh network
802.11b HR/DSSS and 802.11 DSSS
40. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Quality of Service
Arp replay
Client
3
41. An independent basic service set (IBSS) consists of how many access points?
Refraction
0
SOHO brands that support WPS
802.11a
42. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Plaintext
ISM
Dual radio APs
Fake auth
43. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
PIN
Obstacles
Encryption
Small Office/Home Office Organizations (SOHO)
44. Beacons allow client devices to ____ for available LANS
One or more
7
X.509 certificates on the subscriber side only.
Passive scan
45. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Arp
Acknowledgement frames
Captive portal
22MHz wide
46. This is the default mode that sets the card as a client that could then connect to an AP
FHSS
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Managed
Dual radio APs
47. Two authentication types defined in the 802.11 standard
MAC
Open system and Shared key
Active mode
40 bit
48. An Ack is expected for every____ frame transmitted
OFDM
ERP protection
Basic Service Set (BSS)
Unicast
49. In this mode a station can act as a relay or WLAN range extender
BSSID (Basic Service Set identifier)
WPA/WPA2
Repeater
Workgroup Bridge mode.
50. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Addresses wireless Quality of Service
Greenfield mode
Watt and mW