SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Interference from a neighboring access point RF denial-of-service (Dos) attack
802.11w
Brute force - statistical and dictionary
FCC
2. Two authentication types defined in the 802.11 standard
Repeater
3
14
Open system and Shared key
3. The length of a WEP key is typically ___ or ___
64-bit - 128-bit
Height of an RF signal
Quality of Service
CTS attacks - Deauth attack - Association flood - Jamming
4. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Deauth
ISM
RTS/CTS
25 MHz
5. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
802.11r
Station (STA)
UNII
BSSID (Basic Service Set identifier)
6. An Ack is expected for every____ frame transmitted
Unicast
Semi directional and Highly directional
Reflection
TKIP - optional RC4
7. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Repeater
Automatically monitor the network for attacks
Quality of Service
Bridge mode
8. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Refraction
Quality of Service
Authenticate - associate
Independent
9. A weakness with MAC filtering is that it allows an intruder to ____
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Spoof an address
UNII
4 channels
10. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
Know the SSID and enter it manually
Master
WEP
11. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Mismatched SSID
2304 bytes
Degradation
OFDM
12. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Trojan/Rogue APs
Other 802.11a devices
Carefully plan a strategy using WEP and VLANs
One or more
13. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Arp replay
Fakeauth
Authenticate - associate
PIN
14. The Access point can operate in a variety of modes...
1 -6 -11
Roaming
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
64-bit - 128-bit
15. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Height of an RF signal
Mesh
Enter a username and password that will be central administered
Small Office/Home Office Organizations (SOHO)
16. What type of wireless network device is PIN-based security most commonly used with
ARP spoofing
ISM
SOHO brands that support WPS
Quality of Service
17. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Active scanning
Mesh network
Data rate increases
IPSec
18. An independent basic service set (IBSS) consists of how many access points?
Addresses wireless Quality of Service
Dynamic Rate switching
Service sets
0
19. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
HT Non member protection mode
Repeater
Semi directional and Highly directional
Frequency
20. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Client
Captive portal
802.11b
21. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Semi directional and Highly directional
Service sets
Spoof an address
14
22. What is the gain of an antenna measured in
7
Number of users and software applications in use
DBi
MAC
23. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Independent
802.11i
Dynamic Rate switching
Data rate increases
24. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
Other 802.11a devices
Dictionary
IPSec
25. Which function does RBAC provide?
Obstacles
802.11
Restricts access to authorized users
Service sets
26. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
RC4
1
Fake auth
Captive portal
27. What algorithm does WEP use
802.11a
RC4
Fakeauth
Arp
28. A basic service set identifier (BSSID) is the MAC address of the ____
FHSS
AP radio
Plaintext
802.11r
29. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
MAC
Passive scan
Unencrypted
802.11n
30. These are user configurable and present in only five 802.11 frame types...
FHSS
Walled Garden.
WPA2
Beacons - Probe request - Probe response - Association Request - Reassociation Request
31. The capacity of an access point is dependent upon which factors?
Captive portal
1 - 5.5 and 11 Mbps
Number of users and software applications in use
Plaintext
32. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Client
Refraction
6 -12 - and 24 Mbps
33. High Throughput mode 1
Secure Layer 3 transmissions over a public network infrastructure
HT Non member protection mode
Active scanning
Root mode
34. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
802.11w
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
35. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Monitor
Amplitude and phase
0
802.11a
36. This is a topology in which two or more APs are connected by a common distribution system.
Access point
AP to AP
Extended Service Set (ESS)
2.4-2.5GHz
37. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Repeater
Refraction
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Acknowledgement frames
38. This is the default mode that sets the card as a client that could then connect to an AP
Indoor and outdoor
802.11w
Managed
WPA2
39. ___ are used to describe the basic components and topology of a WLAN
Automatically monitor the network for attacks
SSID (service set identifier)
Service sets
Bridge mode
40. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
Active scanning
802.11w
Wavelength
41. The radio card can operate in one of up to six possible modes of operation...
Personal mode and Enterprise Mode
802.11b
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11g
42. Name 3 channels considered non overlapping in the 2.4GHZ band
MAC
1 -6 -11
FCC
Spoof an address
43. Layer 2 Tunneling Protocol commonly uses which encryption method?
1 -6 -11
IPSec
32
Enter a username and password that will be central administered
44. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Mesh
Open system and Shared key
Mismatched SSID
802.11
45. ____ is also known as the Protected management frame standard
Fakeauth
UNII
DB and dBi
802.11w
46. Which if the following organizations is responsible for standards compliance?
Master
7
Wi-Fi Alliance
802.11b HR/DSSS and 802.11 DSSS
47. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Mismatched SSID
One or more
ERP protection
Open system and Shared key
48. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Access point
802.11r
Management - control - data
Personal mode and Enterprise Mode
49. What is regarded in 802.11e?
Semi directional and Highly directional
Roaming
802.11b
Addresses wireless Quality of Service
50. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
HT 20 MHz protection mode
Trojan/Rogue APs
Mesh network
FCC