SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ______________ does not always use an omnidirectional antenna
Transmitter and receiver
Point-to-point link
FCC
7
2. What type of wireless network device is PIN-based security most commonly used with
SOHO brands that support WPS
CTS attacks - Deauth attack - Association flood - Jamming
Carefully plan a strategy using WEP and VLANs
Antenna diversity
3. High throughput mode 2
Dictionary
HT 20 MHz protection mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Interference from a neighboring access point RF denial-of-service (Dos) attack
4. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Spoof an address
One or more
Basic Service Set (BSS)
Station (STA)
5. In order to set up an ad hoc network a user must know which two parameters?
Mismatched SSID
AES = CCMP required
SSID and Channel
Carefully plan a strategy using WEP and VLANs
6. A basic service set identifier (BSSID) is the MAC address of the ____
Active scanning
Degradation
AP radio
1 -6 -11
7. Aireplay-ng -3
Interoperability testing organization
SSID and Channel
Arp
Open system and Shared key
8. 802.11b is capable of which data rates?
AES = CCMP required
1 - 5.5 and 11 Mbps
WPA/WPA2
Obstacles
9. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
WEP
802.11
CCMP
10. WI-Fi Protected Setup was designed for which of the following wireless applications?
Arp replay
Small Office/Home Office Organizations (SOHO)
PIN
MAC
11. A weakness with MAC filtering is that it allows an intruder to ____
7
Workgroup Bridge mode.
Know the SSID and enter it manually
Spoof an address
12. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Security
WPA/WPA2
Wireless gateways
Unencrypted
13. 802.11g LAN operates in what frequency range?
Obstacles
Enter a username and password that will be central administered
2.4-2.5GHz
Watt and mW
14. The 802.11i amendment to the standard addresses which of the following technologies?
Open system and Shared key
Security
Personal mode and Enterprise Mode
CTS attacks - Deauth attack - Association flood - Jamming
15. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Wireless Game adapters and Media Bridges
Fake auth
802.11a
Interference from a neighboring access point RF denial-of-service (Dos) attack
16. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Passphrase
Dynamic Rate switching
802.11n
3
17. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
SSID (service set identifier)
WPA Enterprise -WEP -MAC filters
Wireless gateways
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
18. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
Greenfield mode
Arp
Know the SSID and enter it manually
19. This sets the card to participate in an independent basic service set
Ad-Hoc
32
AES = CCMP required
0
20. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
Client
802.11a
Refraction
21. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
Dual radio APs
Wavelength
Mesh network
22. When a wireless LAN device listens for beacon frames - it is participating in which phase?
ERP-OFDM - DSSS
Passve Scanning
Management
2.4-2.5GHz
23. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
1
Client
Addresses wireless Quality of Service
802.11w
24. An independent basic service set (IBSS) consists of how many access points?
Three
0
SSID and Channel
Encryption
25. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
WPA Enterprise -WEP -MAC filters
Other 802.11a devices
Three
Monitor
26. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
4 channels
Service sets
Security
Transmitter and receiver
27. an 802.11b 2.4GHz channel is how wide in MHz?
DBi
Restricts access to authorized users
FCC
22MHz wide
28. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
IPSec
SOHO brands that support WPS
HT Non member protection mode
Workgroup Bridge mode.
29. According to the 802.11a amendment - which data rates are mandatory?
Small Office/Home Office Organizations (SOHO)
6 -12 - and 24 Mbps
Management
RC4
30. ___ are used to describe the basic components and topology of a WLAN
Three
Trojan/Rogue APs
22MHz wide
Service sets
31. Aireplay-ng -1
Transmitter and receiver
AES = CCMP required
Fakeauth
802.11i
32. An Ack is expected for every____ frame transmitted
802.11w
Two
Unicast
2.4-2.5GHz
33. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
Station (STA)
RTS/CTS
Two
34. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Workgroup Bridge mode.
Height of an RF signal
Captive portal
Point-to-point link
35. Typically a point-to-multipoint link consists of ____ connections
Three
802.11n
7
Independent
36. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Indoor and outdoor
Reflection
1
Degradation
37. This is a topology in which two or more APs are connected by a common distribution system.
SSID and Channel
Extended Service Set (ESS)
WPA Enterprise -WEP -MAC filters
Security
38. The Layer 2 frame will be...
Unencrypted
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Active scanning
AP to AP
39. Bluetooth uses a radio technology called
FHSS
Indoor and outdoor
RC4
Managed
40. In bluetooth - one master may communicate with up to ___ slaves in a piconet
CTS attacks - Deauth attack - Association flood - Jamming
Encryption
Roaming
7
41. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Encryption
Bridge mode
Automatically monitor the network for attacks
Plaintext
42. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
64-bit - 128-bit
22MHz wide
MAC
43. 4 types of Denial of Service attacks
Dynamic Rate switching
CTS attacks - Deauth attack - Association flood - Jamming
14
Two
44. As a device moves away from an access point - what is true regarding dynamic rate switching?
Indoor and outdoor
DBi
CTS attacks - Deauth attack - Association flood - Jamming
Data rate increases
45. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
Interoperability testing organization
Independent
Wireless Game adapters and Media Bridges
46. 802.11a uses which spread spectrum technology?
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Active scanning
Reflection
OFDM
47. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Brute force - statistical and dictionary
Interoperability testing organization
Open system
48. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
14
Mismatched SSID
AP to AP
25 MHz
49. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
WEP
Carefully plan a strategy using WEP and VLANs
Fake auth
50. Which process is a VPN solution intended to provide for users connection to a network
Plaintext
Addresses wireless Quality of Service
WPA 2.0 personal and WPS
Secure Layer 3 transmissions over a public network infrastructure
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests