Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. These are user configurable and present in only five 802.11 frame types...






2. A station can act as a routing node in a wireless mesh network






3. Which if the following organizations is responsible for standards compliance?






4. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






5. Probe requests are used by clients as part of the ____ process






6. Maximum length of data (Frame body) is 2304 when ____ is not in use






7. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






8. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






9. Three types of MITM attacks






10. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP






11. What best describes the Wi-Fi alliance?






12. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






13. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






14. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






15. A basic service set identifier (BSSID) is the MAC address of the ____






16. What type of algorithm does WPA use






17. The association process happens after which phase?






18. High Throughput mode 0






19. What is the gain of an antenna measured in






20. The length of a WEP key is typically ___ or ___






21. What type of wireless network device is PIN-based security most commonly used with






22. High throughput mode 3






23. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






24. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






25. A service set identifier (SSID) has a maximum limit of how many characters?






26. 4 types of Denial of Service attacks






27. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






28. Beacons allow client devices to ____ for available LANS






29. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






30. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






31. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






32. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






33. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






34. According to the 802.11a amendment - which data rates are mandatory?






35. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






36. A weakness with MAC filtering is that it allows an intruder to ____






37. The 802.11i amendment to the standard addresses which of the following technologies?






38. This is typically the 48-bit MAC address of the access point's radio card.






39. Three types of passive WEP attacks






40. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






41. an 802.11b 2.4GHz channel is how wide in MHz?






42. In repeater mode - the repeater device connects to a normal '___ mode'






43. Give two examples of WGB devices.






44. Aireplay-ng -0






45. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






46. Bridge mode will not allow client associations and is ______ only






47. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






48. A brute force attack is limited to breaking___ WEP keys






49. 802.11 uses CSMA/...






50. What is regarded in 802.11e?







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests