SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A newly configured wireless intrusion prevention system will___
Plaintext
Extended Service Set (ESS)
802.11a
Automatically monitor the network for attacks
2. A basic service set (BSS) consists of how many access points
Mesh
Interference from a neighboring access point RF denial-of-service (Dos) attack
1
Unencrypted
3. The Access point can operate in a variety of modes...
Management - control - data
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Open system
0
4. Layer 2 Tunneling Protocol commonly uses which encryption method?
Plaintext
Amplitude and phase
Trojan/Rogue APs - Arp spoofing - DNS spoofing
IPSec
5. This sets the card to participate in an independent basic service set
SSID and Channel
Ad-Hoc
One or more
Trojan/Rogue APs
6. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Ad-Hoc
Unencrypted
Arp replay
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
7. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
FHSS
Greenfield mode
AP to AP
8. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
HT Non member protection mode
RC4
Master
9. According to the 802.11a amendment - which data rates are mandatory?
BSSID (Basic Service Set identifier)
6 -12 - and 24 Mbps
Spoof an address
Station (STA)
10. an 802.11b 2.4GHz channel is how wide in MHz?
7
22MHz wide
ERP protection
802.11g
11. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
802.11i
LTE
Bridge mode
12. High Throughput mode 1
HT Non member protection mode
Station (STA)
X.509 certificates on the subscriber side only.
Dual radio APs
13. The security amendment to the IEEE 802.11 standard requires ____
HT fixed mode
IPSec
CCMP
Repeater
14. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
4 channels
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Two
ISM
15. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Dynamic Rate switching
802.11b
2.4-2.5GHz
Height of an RF signal
16. Which function does RBAC provide?
Restricts access to authorized users
Number of users and software applications in use
IPSec
Other 802.11a devices
17. The radio card can operate in one of up to six possible modes of operation...
Three
14
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
PIN
18. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Master
Roaming
DBi
Three
19. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
2304 bytes
Management - control - data
Managed
MAC
20. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
WPA Enterprise -WEP -MAC filters
802.11
Fake auth
Greenfield mode
21. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Amplitude and phase
Know the SSID and enter it manually
Dynamic Rate switching
22. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
CCMP
Unicast
SSID (service set identifier)
RC4
23. Typically a point-to-multipoint link consists of ____ connections
WPA/WPA2
Restricts access to authorized users
Interference from a neighboring access point RF denial-of-service (Dos) attack
Three
24. As a device moves away from an access point - what is true regarding dynamic rate switching?
Transmitter and receiver
Passve Scanning
Data rate increases
7
25. The capacity of an access point is dependent upon which factors?
22MHz wide
CTS attacks - Deauth attack - Association flood - Jamming
Frequency
Number of users and software applications in use
26. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Two
Unicast
A VPN to the office network
27. 802.11 frames have a maximum 'upper-layer' payload of...
Extended Service Set (ESS)
2304 bytes
Frequency
Passve Scanning
28. Name two relative measures of power
DB and dBi
Personal mode and Enterprise Mode
UNII
WPA2 -WEP
29. Two authentication types defined in the 802.11 standard
22MHz wide
Open system and Shared key
LTE
Master
30. Aireplay-ng -3
Arp
A VPN to the office network
Mesh
802.11g
31. This type of authentication is essentially 'Null authentication'
Monitor
Open system
Other 802.11a devices
Number of users and software applications in use
32. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Interference from a neighboring access point RF denial-of-service (Dos) attack
ERP-OFDM - DSSS
Plaintext
Dual radio APs
33. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
HT Non member protection mode
Obstacles
Deauth
34. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Residential and Enterprise
11
Acknowledgement frames
Reflection
35. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Basic Service Set (BSS)
Wavelength
Management - control - data
Dual radio APs
36. The ___ acts as a hub for the WLAN; wireless frame pass through this device
BSSID (Basic Service Set identifier)
22MHz wide
Access point
CCMP
37. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Service sets
Open system and Shared key
7
802.11b HR/DSSS and 802.11 DSSS
38. 802.11w can only be used in networks using_____
Extended Service Set (ESS)
2.4-2.5GHz
WPA/WPA2
802.11b
39. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
SOHO brands that support WPS
Mesh network
Wireless Game adapters and Media Bridges
Management
40. Three types of passive WEP attacks
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Arp replay
802.11i
Brute force - statistical and dictionary
41. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
WPA2 -WEP
Fakeauth
Arp replay
42. Beacons allow client devices to ____ for available LANS
Basic Service Set (BSS)
Passive scan
WPA2
ERP protection
43. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Access point
Managed
HT Non member protection mode
Carefully plan a strategy using WEP and VLANs
44. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Enter a username and password that will be central administered
Quality of Service
Point-to-point link
Secure Layer 3 transmissions over a public network infrastructure
45. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Independent
ARP spoofing
X.509 certificates on the subscriber side only.
46. What type of algorithm does WPA use
Arp
Client
802.11b HR/DSSS and 802.11 DSSS
TKIP - optional RC4
47. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Open system and Shared key
Active mode
Encryption
Data rate increases
48. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Refraction
Mismatched SSID
Semi directional and Highly directional
Plaintext
49. A ______________ does not always use an omnidirectional antenna
WPA 2.0 personal and WPS
Point-to-point link
2.4-2.5GHz
802.11g
50. ____ is also known as the Protected management frame standard
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
802.11w
14
Ad-Hoc