SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. High throughput mode 2
Arp replay
Repeater
Fakeauth
HT 20 MHz protection mode
2. Wireless gateways come in two primary forms...
Mismatched SSID
Passphrase
Residential and Enterprise
25 MHz
3. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
WEP
PIN
Repeater
Fakeauth
4. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Quality of Service
802.11g
AP to AP
Unicast
5. Point to Point links typically use which antenna types?
Addresses wireless Quality of Service
Semi directional and Highly directional
Interoperability testing organization
CA - Collision avoidance
6. In order to set up an ad hoc network a user must know which two parameters?
802.11a
Extended Service Set (ESS)
SSID and Channel
Active scanning
7. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Residential and Enterprise
WPA Enterprise -WEP -MAC filters
Passve Scanning
Dynamic Rate switching
8. What type of wireless network device is PIN-based security most commonly used with
Antenna diversity
SOHO brands that support WPS
Roaming
HT fixed mode
9. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Brute force - statistical and dictionary
802.11r
Trojan/Rogue APs
HT fixed mode
10. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Interoperability testing organization
SSID and Channel
Authenticate - associate
Semi directional and Highly directional
11. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
SOHO brands that support WPS
1 -6 -11
Arp
12. Which items are unique to a service set identifier
Mesh network
32 character maximum and is case sensitive
Diffraction
BSSID (Basic Service Set identifier)
13. Give two examples of WGB devices.
7
Unicast
802.11w
Wireless Game adapters and Media Bridges
14. Which function does RBAC provide?
Data rate increases
OFDM
UNII
Restricts access to authorized users
15. Aireplay-ng -3
Arp
802.11i
Mesh
Secure Layer 3 transmissions over a public network infrastructure
16. A brute force attack is limited to breaking___ WEP keys
802.11b
40 bit
Wavelength
CTS attacks - Deauth attack - Association flood - Jamming
17. Three types of passive WEP attacks
Brute force - statistical and dictionary
Height of an RF signal
Repeater
Refraction
18. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Know the SSID and enter it manually
802.11w
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
7
19. As a device moves away from an access point - what is true regarding dynamic rate switching?
Mismatched SSID
Authentication
Client
Data rate increases
20. High Throughput mode 0
WPA Enterprise -WEP -MAC filters
Greenfield mode
1
1 -6 -11
21. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Mismatched SSID
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
ARP spoofing
Open system
22. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Management
Bridge mode
HT Non member protection mode
Wi-Fi Alliance
23. The Layer 2 frame will be...
DB and dBi
Unencrypted
Encryption
One or more
24. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
Semi directional and Highly directional
Client
Obstacles
25. 3 types of frames
Management - control - data
Data rate increases
Mesh
Root mode
26. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
WPA2 -WEP
Carefully plan a strategy using WEP and VLANs
Greenfield mode
Mesh network
27. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
2304 bytes
Passve Scanning
AP radio
WPA 2.0 personal and WPS
28. This is typically the 48-bit MAC address of the access point's radio card.
Monitor
Arp replay
BSSID (Basic Service Set identifier)
Mesh
29. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
AES = CCMP required
Trojan/Rogue APs - Arp spoofing - DNS spoofing
0
30. 802.11b is capable of which data rates?
ERP-OFDM - DSSS
1 - 5.5 and 11 Mbps
Access point
25 MHz
31. Aireplay-ng -0
Deauth
FHSS
Two
Bridge mode
32. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Active mode
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Wavelength
33. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Wavelength
Arp replay
Interference from a neighboring access point RF denial-of-service (Dos) attack
LTE
34. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
SSID (service set identifier)
1
Managed
MAC
35. In this mode - the card acts as a normal access point
Master
Wavelength
Unencrypted
Passve Scanning
36. an 802.11b 2.4GHz channel is how wide in MHz?
DB and dBi
Open system and Shared key
22MHz wide
2.4-2.5GHz
37. What organization is responsible for unlicensed frequency band regulations in the United States?
Personal mode and Enterprise Mode
FCC
802.11i
Unencrypted
38. A weakness with MAC filtering is that it allows an intruder to ____
25 MHz
32
Spoof an address
Authentication
39. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
AES = CCMP required
Transmitter and receiver
Unicast
40. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Basic Service Set (BSS)
ISM
WPA2 -WEP
ERP protection
41. This sets the card to participate in an independent basic service set
Passphrase
Ad-Hoc
0
X.509 certificates on the subscriber side only.
42. Collisions are detected through the use of....
802.11a
7
40 bit
Acknowledgement frames
43. The radio card can operate in one of up to six possible modes of operation...
Repeater
Data rate increases
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11g
44. A ______________ does not always use an omnidirectional antenna
ISM
Point-to-point link
Monitor
TKIP - optional RC4
45. In bluetooth - one master may communicate with up to ___ slaves in a piconet
7
Arp
1
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
46. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
WPA2
40 bit
Wireless gateways
Access point
47. This is a topology in which two or more APs are connected by a common distribution system.
Fakeauth
Secure Layer 3 transmissions over a public network infrastructure
WEP
Extended Service Set (ESS)
48. WPA was developed as an interim solution for which amendment to the 802.11 standards?
6 -12 - and 24 Mbps
WPA/WPA2
Passve Scanning
802.11i
49. A station can act as a routing node in a wireless mesh network
Captive portal
25 MHz
ERP-OFDM - DSSS
Mesh
50. Bridge mode will not allow client associations and is ______ only
HT fixed mode
AP to AP
Managed
Trojan/Rogue APs