SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11w can only be used in networks using_____
Watt and mW
WPA/WPA2
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
HT Non member protection mode
2. the amplitude of an RF signal is
Dual radio APs
Height of an RF signal
RTS/CTS
FCC
3. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Point-to-point link
4 channels
Encryption
4. Wireless gateways come in two primary forms...
Residential and Enterprise
4 channels
Refraction
Bridge mode
5. 802.11g LAN operates in what frequency range?
6 -12 - and 24 Mbps
PIN
2.4-2.5GHz
32
6. Which process is a VPN solution intended to provide for users connection to a network
MAC
Obstacles
Brute force - statistical and dictionary
Secure Layer 3 transmissions over a public network infrastructure
7. WiMAX 802.16 authentication is based on...
AP to AP
Trojan/Rogue APs
X.509 certificates on the subscriber side only.
Personal mode and Enterprise Mode
8. This is typically the 48-bit MAC address of the access point's radio card.
7
Active mode
Point-to-point link
BSSID (Basic Service Set identifier)
9. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
802.11w
Other 802.11a devices
TKIP - optional RC4
WPA 2.0 personal and WPS
10. In repeater mode - the repeater device connects to a normal '___ mode'
802.11g
Root mode
Captive portal
Transmitter and receiver
11. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
AP to AP
Wavelength
Access point
Acknowledgement frames
12. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
WPA/WPA2
CTS attacks - Deauth attack - Association flood - Jamming
FCC
13. Beacons allow client devices to ____ for available LANS
ERP protection
Quality of Service
WPA2 -WEP
Passive scan
14. Name 3 channels considered non overlapping in the 2.4GHZ band
ISM
Repeater
1 -6 -11
1 - 5.5 and 11 Mbps
15. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Passive scan
4 channels
Passve Scanning
Open system and Shared key
16. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Mismatched SSID
Passive scan
Mesh network
Restricts access to authorized users
17. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
22MHz wide
Small Office/Home Office Organizations (SOHO)
4 channels
Frequency
18. This is a topology in which two or more APs are connected by a common distribution system.
Passphrase
Three
Extended Service Set (ESS)
Mesh network
19. The 802.11g standard uses which two speed spectrum technologies.
4 channels
Passive scan
ERP-OFDM - DSSS
TKIP - optional RC4
20. Two authentication types defined in the 802.11 standard
Arp
SSID and Channel
Open system and Shared key
AP to AP
21. What item has an effect on RF line of site?
Obstacles
ERP-OFDM - DSSS
WEP
0
22. High Throughput mode 1
Passve Scanning
CA - Collision avoidance
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
HT Non member protection mode
23. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Quality of Service
Mismatched SSID
Personal mode and Enterprise Mode
Service sets
24. WI-Fi Protected Setup was designed for which of the following wireless applications?
BSSID (Basic Service Set identifier)
TKIP - optional RC4
HT 20 MHz protection mode
Small Office/Home Office Organizations (SOHO)
25. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
HT fixed mode
Antenna diversity
Spoof an address
26. Point to Point links typically use which antenna types?
BSSID (Basic Service Set identifier)
Automatically monitor the network for attacks
Semi directional and Highly directional
32 character maximum and is case sensitive
27. The 802.11i amendment to the standard addresses which of the following technologies?
TKIP - optional RC4
32 character maximum and is case sensitive
14
Security
28. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Management
802.11r
Spoof an address
802.11b
29. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
22MHz wide
Open system and Shared key
30. an 802.11b 2.4GHz channel is how wide in MHz?
2304 bytes
UNII
OFDM
22MHz wide
31. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Access point
SOHO brands that support WPS
Station (STA)
Reflection
32. According to the 802.11a amendment - which data rates are mandatory?
Restricts access to authorized users
Security
Ad-Hoc
6 -12 - and 24 Mbps
33. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
LTE
Indoor and outdoor
Transmitter and receiver
34. What is regarded in 802.11e?
Addresses wireless Quality of Service
Workgroup Bridge mode.
Authenticate - associate
802.11
35. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
ARP spoofing
Passive scan
SSID (service set identifier)
Open system and Shared key
36. Three types of passive WEP attacks
Captive portal
Brute force - statistical and dictionary
AES = CCMP required
Semi directional and Highly directional
37. Bridge mode will not allow client associations and is ______ only
AP to AP
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Arp replay
Repeater
38. A basic service set (BSS) consists of how many access points
Automatically monitor the network for attacks
1
Number of users and software applications in use
2.4-2.5GHz
39. 4 types of Denial of Service attacks
6 -12 - and 24 Mbps
Watt and mW
CTS attacks - Deauth attack - Association flood - Jamming
Degradation
40. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Management
BSSID (Basic Service Set identifier)
Independent
Active mode
41. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
A VPN to the office network
PIN
Arp replay
Mesh
42. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Three
UNII
Know the SSID and enter it manually
Point-to-point link
43. Bluetooth uses a radio technology called
FHSS
Point-to-point link
LTE
Fake auth
44. In this mode a station can act as a relay or WLAN range extender
A VPN to the office network
Repeater
MAC
Open system
45. Typically a point-to-multipoint link consists of ____ connections
WPA2
Reflection
Open system and Shared key
Three
46. Name two absolute measures of RF power
Passive scan
Ad-Hoc
802.11b
Watt and mW
47. Collisions are detected through the use of....
Acknowledgement frames
Encryption
Small Office/Home Office Organizations (SOHO)
Degradation
48. What algorithm does WEP use
Quality of Service
802.11a
RC4
32
49. 802.11 uses CSMA/...
Wireless gateways
CA - Collision avoidance
Mesh network
SOHO brands that support WPS
50. Which security feature provides the strongest security for a home-based wireless network?
Station (STA)
Indoor and outdoor
Degradation
Passphrase