Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What type of certification came from 802.11i






2. Which items are unique to a service set identifier






3. 802.11 uses CSMA/...






4. Bluetooth uses a radio technology called






5. Name two absolute measures of RF power






6. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






7. Which security feature provides the strongest security for a home-based wireless network?






8. According to the 802.11a amendment - which data rates are mandatory?






9. In this mode - the card acts as a normal access point






10. A station can act as a routing node in a wireless mesh network






11. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






12. The security amendment to the IEEE 802.11 standard requires ____






13. 802.11 frames have a maximum 'upper-layer' payload of...






14. 802.11g LAN operates in what frequency range?






15. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






16. High Throughput mode 0






17. WPA was developed as an interim solution for which amendment to the 802.11 standards?






18. When RF passes or bends around an obstacle such as a building or column - the behavior is






19. WI-Fi Protected Setup was designed for which of the following wireless applications?






20. Which process is a VPN solution intended to provide for users connection to a network






21. This is the default mode that sets the card as a client that could then connect to an AP






22. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






23. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






24. As a device moves away from an access point - what is true regarding dynamic rate switching?






25. These are user configurable and present in only five 802.11 frame types...






26. A service set identifier (SSID) has a maximum limit of how many characters?






27. What type of algorithm does WPA use






28. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






29. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






30. Probe requests are used by clients as part of the ____ process






31. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






32. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






33. A newly configured wireless intrusion prevention system will___






34. What kind of Algorithm does WPA2 use?






35. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






36. The Layer 2 frame will be...






37. The association process happens after which phase?






38. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






39. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






40. What algorithm does WEP use






41. The length of a WEP key is typically ___ or ___






42. High throughput mode 3






43. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






44. A basic service set identifier (BSSID) is the MAC address of the ____






45. What type of wireless network device is PIN-based security most commonly used with






46. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






47. Typically a point-to-multipoint link consists of ____ connections






48. Point to Point links typically use which antenna types?






49. The 802.11g standard uses which two speed spectrum technologies.






50. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?