SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A pre-shared key mode may be vulnerable to a ____ attack
Small Office/Home Office Organizations (SOHO)
Dictionary
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
ARP spoofing
2. This sets the card to participate in an independent basic service set
Management - control - data
Single radio AP's
Ad-Hoc
Open system
3. Collisions are detected through the use of....
Monitor
802.11g
Acknowledgement frames
HT fixed mode
4. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Passphrase
FCC
Mesh
Other 802.11a devices
5. In this mode a station can act as a relay or WLAN range extender
MAC
Quality of Service
Restricts access to authorized users
Repeater
6. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Extended Service Set (ESS)
MAC
ISM
Bridge mode
7. This is the default mode that sets the card as a client that could then connect to an AP
Managed
6 -12 - and 24 Mbps
Roaming
Restricts access to authorized users
8. An independent basic service set (IBSS) consists of how many access points?
802.11g
SOHO brands that support WPS
0
802.11b
9. 802.11w can only be used in networks using_____
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
802.11n
Deauth
WPA/WPA2
10. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
Wireless gateways
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
40 bit
11. Three types of passive WEP attacks
6 -12 - and 24 Mbps
Brute force - statistical and dictionary
Other 802.11a devices
AP to AP
12. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Station (STA)
Dynamic Rate switching
2.4-2.5GHz
25 MHz
13. an 802.11b 2.4GHz channel is how wide in MHz?
32 character maximum and is case sensitive
Roaming
22MHz wide
Arp replay
14. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
64-bit - 128-bit
Obstacles
Height of an RF signal
15. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Mismatched SSID
Wireless gateways
Passive scan
Secure Layer 3 transmissions over a public network infrastructure
16. Which if the following organizations is responsible for standards compliance?
Repeater
Wi-Fi Alliance
802.11a
Walled Garden.
17. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Unicast
Residential and Enterprise
Passve Scanning
AP to AP
18. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
Wi-Fi Alliance
Degradation
Brute force - statistical and dictionary
19. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
25 MHz
Quality of Service
Fakeauth
Brute force - statistical and dictionary
20. The open system authentication process uses how many frames?
Roaming
Two
1 -6 -11
Other 802.11a devices
21. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
4 channels
ISM
Captive portal
802.11r
22. The Layer 2 frame will be...
Unencrypted
Master
1
WPA 2.0 personal and WPS
23. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
Height of an RF signal
WPA/WPA2
Basic Service Set (BSS)
24. ___ are used to describe the basic components and topology of a WLAN
Roaming
Service sets
Access point
Passphrase
25. 802.11 frames have a maximum 'upper-layer' payload of...
2.4-2.5GHz
2304 bytes
HT fixed mode
FCC
26. 3 types of antennas
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Secure Layer 3 transmissions over a public network infrastructure
Open system
Roaming
27. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
DB and dBi
Small Office/Home Office Organizations (SOHO)
OFDM
MAC
28. What is regarded in 802.11e?
Unencrypted
Basic Service Set (BSS)
Restricts access to authorized users
Addresses wireless Quality of Service
29. Probe requests are used by clients as part of the ____ process
Authenticate - associate
Active scanning
Workgroup Bridge mode.
1 - 5.5 and 11 Mbps
30. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Other 802.11a devices
ISM
Interference from a neighboring access point RF denial-of-service (Dos) attack
Active scanning
31. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Extended Service Set (ESS)
Enter a username and password that will be central administered
Degradation
OFDM
32. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
One or more
Security
Authenticate - associate
ERP-OFDM - DSSS
33. The security amendment to the IEEE 802.11 standard requires ____
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Acknowledgement frames
CCMP
MAC
34. 4 types of Denial of Service attacks
Authenticate - associate
DB and dBi
CTS attacks - Deauth attack - Association flood - Jamming
Passve Scanning
35. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
802.11b HR/DSSS and 802.11 DSSS
32 character maximum and is case sensitive
Restricts access to authorized users
36. The length of a WEP key is typically ___ or ___
Open system and Shared key
Single radio AP's
HT 20 MHz protection mode
64-bit - 128-bit
37. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Height of an RF signal
Trojan/Rogue APs
Watt and mW
Fake auth
38. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
Arp
Managed
WPA2 -WEP
39. Which function does RBAC provide?
HT Non member protection mode
Restricts access to authorized users
Indoor and outdoor
Data rate increases
40. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Encryption
Access point
Plaintext
CCMP
41. A newly configured wireless intrusion prevention system will___
Ad-Hoc
Mesh
Acknowledgement frames
Automatically monitor the network for attacks
42. The Access point can operate in a variety of modes...
802.11n
Quality of Service
802.11w
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
43. Two characteristics of signals are
WEP
802.11b HR/DSSS and 802.11 DSSS
802.11n
Amplitude and phase
44. What kind of Algorithm does WPA2 use?
64-bit - 128-bit
Root mode
AES = CCMP required
WPA2 -WEP
45. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
Client
Master
0
46. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Encryption
AP to AP
Wireless Game adapters and Media Bridges
RTS/CTS
47. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
AP to AP
HT Non member protection mode
DB and dBi
48. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
Trojan/Rogue APs - Arp spoofing - DNS spoofing
PIN
22MHz wide
49. Three types of MITM attacks
A VPN to the office network
2304 bytes
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Master
50. High throughput mode 2
HT 20 MHz protection mode
Management
Basic Service Set (BSS)
Arp