SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11n
22MHz wide
Trojan/Rogue APs
Fakeauth
2. In repeater mode - the repeater device connects to a normal '___ mode'
MAC
Number of users and software applications in use
802.11
Root mode
3. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
1
Mismatched SSID
Security
Managed
4. High Throughput mode 0
Bridge mode
Greenfield mode
Data rate increases
Restricts access to authorized users
5. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Walled Garden.
HT 20 MHz protection mode
4 channels
Dual radio APs
6. 802.11a uses which spread spectrum technology?
Single radio AP's
Active mode
Interoperability testing organization
OFDM
7. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
2304 bytes
802.11r
ERP-OFDM - DSSS
Know the SSID and enter it manually
8. When RF passes or bends around an obstacle such as a building or column - the behavior is
Amplitude and phase
Diffraction
11
25 MHz
9. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Management - control - data
Residential and Enterprise
Quality of Service
One or more
10. What best describes the Wi-Fi alliance?
802.11
Passive scan
Interoperability testing organization
Bridge mode
11. Give two examples of WGB devices.
Residential and Enterprise
Wireless Game adapters and Media Bridges
Bridge mode
MAC
12. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Carefully plan a strategy using WEP and VLANs
Mesh network
Diffraction
Wireless Game adapters and Media Bridges
13. 802.11 frames have a maximum 'upper-layer' payload of...
Obstacles
14
2304 bytes
Other 802.11a devices
14. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Encryption
SSID (service set identifier)
Repeater
15. The 802.11i amendment to the standard addresses which of the following technologies?
WPA 2.0 personal and WPS
Workgroup Bridge mode.
Security
OFDM
16. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
ERP protection
Authentication
Frequency
17. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
DBi
Deauth
Trojan/Rogue APs
18. WI-Fi Protected Setup was designed for which of the following wireless applications?
Secure Layer 3 transmissions over a public network infrastructure
Small Office/Home Office Organizations (SOHO)
FCC
Two
19. Collisions are detected through the use of....
802.11g
Passve Scanning
802.11i
Acknowledgement frames
20. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
40 bit
Authentication
Managed
21. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Refraction
Beacons - Probe request - Probe response - Association Request - Reassociation Request
WPA Enterprise -WEP -MAC filters
Indoor and outdoor
22. What type of algorithm does WPA use
Wireless Game adapters and Media Bridges
TKIP - optional RC4
Height of an RF signal
Indoor and outdoor
23. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Semi directional and Highly directional
Other 802.11a devices
Beacons - Probe request - Probe response - Association Request - Reassociation Request
SOHO brands that support WPS
24. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
Enter a username and password that will be central administered
Arp
SOHO brands that support WPS
25. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
WPA2
WPA Enterprise -WEP -MAC filters
Managed
802.11b HR/DSSS and 802.11 DSSS
26. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Open system
Reflection
802.11b HR/DSSS and 802.11 DSSS
Quality of Service
27. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Fake auth
A VPN to the office network
PIN
Passphrase
28. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Interoperability testing organization
Other 802.11a devices
Open system
Fake auth
29. High throughput mode 2
HT 20 MHz protection mode
Secure Layer 3 transmissions over a public network infrastructure
6 -12 - and 24 Mbps
AES = CCMP required
30. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Brute force - statistical and dictionary
802.11g
SSID and Channel
4 channels
31. Which function does RBAC provide?
Restricts access to authorized users
802.11w
Degradation
64-bit - 128-bit
32. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Management - control - data
Wireless gateways
Workgroup Bridge mode.
BSSID (Basic Service Set identifier)
33. The association process happens after which phase?
Antenna diversity
Authentication
Ad-Hoc
Basic Service Set (BSS)
34. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
ERP-OFDM - DSSS
DBi
Walled Garden.
Arp replay
35. 802.11b is capable of which data rates?
14
WEP
Reflection
1 - 5.5 and 11 Mbps
36. These are user configurable and present in only five 802.11 frame types...
Bridge mode
Carefully plan a strategy using WEP and VLANs
Diffraction
Beacons - Probe request - Probe response - Association Request - Reassociation Request
37. According to the 802.11a amendment - which data rates are mandatory?
6 -12 - and 24 Mbps
RTS/CTS
ERP protection
IPSec
38. In this mode - the card acts as a normal access point
HT Non member protection mode
Mesh
Master
CCMP
39. Three types of MITM attacks
1 -6 -11
Trojan/Rogue APs - Arp spoofing - DNS spoofing
DBi
Semi directional and Highly directional
40. The security amendment to the IEEE 802.11 standard requires ____
40 bit
Addresses wireless Quality of Service
6 -12 - and 24 Mbps
CCMP
41. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Obstacles
LTE
Access point
1 -6 -11
42. 802.11 uses CSMA/...
CA - Collision avoidance
Unencrypted
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
43. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
WPA 2.0 personal and WPS
Three
Wireless gateways
Amplitude and phase
44. the amplitude of an RF signal is
Personal mode and Enterprise Mode
Dictionary
1 -6 -11
Height of an RF signal
45. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Arp replay
WEP
Diffraction
802.11b
46. Point to Point links typically use which antenna types?
Three
Semi directional and Highly directional
Amplitude and phase
Management
47. Three types of passive WEP attacks
Wavelength
Roaming
Bridge mode
Brute force - statistical and dictionary
48. The radio card can operate in one of up to six possible modes of operation...
Management - control - data
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
SSID (service set identifier)
Height of an RF signal
49. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Brute force - statistical and dictionary
Management
WPA 2.0 personal and WPS
Fake auth
50. The 802.11g standard uses which two speed spectrum technologies.
ERP protection
TKIP - optional RC4
WPA2
ERP-OFDM - DSSS