Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The open system authentication process uses how many frames?






2. This sets the card to participate in an independent basic service set






3. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






4. A newly configured wireless intrusion prevention system will___






5. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






6. In this mode a station can act as a relay or WLAN range extender






7. What type of certification came from 802.11i






8. Which if the following organizations is responsible for standards compliance?






9. A weakness with MAC filtering is that it allows an intruder to ____






10. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






11. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






12. 4 types of Denial of Service attacks






13. Give two examples of WGB devices.






14. What is the gain of an antenna measured in






15. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






16. These are user configurable and present in only five 802.11 frame types...






17. A station can act as a routing node in a wireless mesh network






18. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






19. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...






20. Name two relative measures of power






21. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






22. 3 types of antennas






23. 3 types of frames






24. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






25. The 802.11i amendment to the standard addresses which of the following technologies?






26. The association process happens after which phase?






27. An Ack is expected for every____ frame transmitted






28. Beacons allow client devices to ____ for available LANS






29. Two characteristics of signals are






30. A ______________ does not always use an omnidirectional antenna






31. The radio card can operate in one of up to six possible modes of operation...






32. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






33. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






34. What kind of Algorithm does WPA2 use?






35. Wireless gateways come in two primary forms...






36. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






37. High Throughput mode 1






38. Two authentication types defined in the 802.11 standard






39. The capacity of an access point is dependent upon which factors?






40. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






41. Management frames are sent in....






42. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






43. A basic service set (BSS) consists of how many access points






44. An independent basic service set (IBSS) consists of how many access points?






45. Which process is a VPN solution intended to provide for users connection to a network






46. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






47. WiMAX 802.16 authentication is based on...






48. 802.11b is capable of which data rates?






49. A brute force attack is limited to breaking___ WEP keys






50. ___ is the topology in which no AP participates - client devices communicate directly to eachother.