SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Wavelength
CCMP
Restricts access to authorized users
Access point
2. The 802.11i amendment to the standard addresses which of the following technologies?
2304 bytes
Security
Fakeauth
ERP protection
3. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
802.11w
Know the SSID and enter it manually
Enter a username and password that will be central administered
Other 802.11a devices
4. ____ is also known as the Protected management frame standard
Station (STA)
22MHz wide
802.11w
Arp
5. Name two absolute measures of RF power
Monitor
Watt and mW
7
Reflection
6. The Access point can operate in a variety of modes...
Client
OFDM
Open system
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
7. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Three
Reflection
Repeater
8. High Throughput mode 1
HT Non member protection mode
Height of an RF signal
Diffraction
AP radio
9. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Captive portal
Trojan/Rogue APs
Wireless gateways
802.11
10. Point to Point links typically use which antenna types?
DB and dBi
Dual radio APs
Personal mode and Enterprise Mode
Semi directional and Highly directional
11. Wireless gateways come in two primary forms...
22MHz wide
AP to AP
Residential and Enterprise
WEP
12. The security amendment to the IEEE 802.11 standard requires ____
CCMP
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Automatically monitor the network for attacks
Indoor and outdoor
13. A newly configured wireless intrusion prevention system will___
CTS attacks - Deauth attack - Association flood - Jamming
Trojan/Rogue APs
Automatically monitor the network for attacks
2304 bytes
14. According to the 802.11a amendment - which data rates are mandatory?
6 -12 - and 24 Mbps
Degradation
802.11a
PIN
15. Typically a point-to-multipoint link consists of ____ connections
Refraction
Degradation
2304 bytes
Three
16. What two devices use RF to communicate
Addresses wireless Quality of Service
Transmitter and receiver
PIN
Repeater
17. Which items are unique to a service set identifier
Wireless Game adapters and Media Bridges
32 character maximum and is case sensitive
Unicast
Authenticate - associate
18. The Layer 2 frame will be...
Basic Service Set (BSS)
802.11
Acknowledgement frames
Unencrypted
19. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Height of an RF signal
Management
802.11a
20. A basic service set identifier (BSSID) is the MAC address of the ____
Number of users and software applications in use
Arp
AP radio
X.509 certificates on the subscriber side only.
21. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Amplitude and phase
PIN
Active scanning
ARP spoofing
22. In this mode a station can act as a relay or WLAN range extender
Repeater
Plaintext
Mesh
Personal mode and Enterprise Mode
23. Layer 2 Tunneling Protocol commonly uses which encryption method?
CA - Collision avoidance
Arp replay
IPSec
Management
24. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
UNII
Data rate increases
Workgroup Bridge mode.
25. What type of wireless network device is PIN-based security most commonly used with
SOHO brands that support WPS
Acknowledgement frames
Know the SSID and enter it manually
Greenfield mode
26. Bridge mode will not allow client associations and is ______ only
FHSS
AP to AP
Carefully plan a strategy using WEP and VLANs
Restricts access to authorized users
27. Probe requests are used by clients as part of the ____ process
Ad-Hoc
Roaming
Dictionary
Active scanning
28. Name two relative measures of power
Refraction
802.11
DB and dBi
Quality of Service
29. 4 types of Denial of Service attacks
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
UNII
CTS attacks - Deauth attack - Association flood - Jamming
Authentication
30. Two authentication types defined in the 802.11 standard
ERP protection
Open system and Shared key
Repeater
Active scanning
31. A ______________ does not always use an omnidirectional antenna
Point-to-point link
Diffraction
HT Non member protection mode
Quality of Service
32. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
ARP spoofing
SSID and Channel
Know the SSID and enter it manually
Mismatched SSID
33. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
2304 bytes
0
One or more
ERP-OFDM - DSSS
34. Two characteristics of signals are
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
HT 20 MHz protection mode
Amplitude and phase
1 -6 -11
35. the amplitude of an RF signal is
A VPN to the office network
Small Office/Home Office Organizations (SOHO)
Height of an RF signal
Wavelength
36. Beacons allow client devices to ____ for available LANS
Number of users and software applications in use
Wireless Game adapters and Media Bridges
OFDM
Passive scan
37. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
Enter a username and password that will be central administered
1 -6 -11
32 character maximum and is case sensitive
38. Which if the following organizations is responsible for standards compliance?
Number of users and software applications in use
Wi-Fi Alliance
Ad-Hoc
DB and dBi
39. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Antenna diversity
SSID (service set identifier)
Repeater
Frequency
40. Name 3 channels considered non overlapping in the 2.4GHZ band
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Data rate increases
1 -6 -11
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
41. Which data encryption.authentication method is identified in the IEEE 802.11 standard
HT fixed mode
Active mode
Spoof an address
WEP
42. High Throughput mode 0
14
Wireless gateways
Greenfield mode
ISM
43. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Secure Layer 3 transmissions over a public network infrastructure
1 - 5.5 and 11 Mbps
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Open system
44. The radio card can operate in one of up to six possible modes of operation...
Encryption
RTS/CTS
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Open system
45. In order to set up an ad hoc network a user must know which two parameters?
BSSID (Basic Service Set identifier)
SSID and Channel
Management
Unencrypted
46. A service set identifier (SSID) has a maximum limit of how many characters?
7
DB and dBi
32
AP radio
47. Which function does RBAC provide?
Restricts access to authorized users
Management
BSSID (Basic Service Set identifier)
Access point
48. Collisions are detected through the use of....
UNII
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Acknowledgement frames
Authenticate - associate
49. WiMAX 802.16 authentication is based on...
Authenticate - associate
Managed
22MHz wide
X.509 certificates on the subscriber side only.
50. Three types of MITM attacks
Access point
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Authenticate - associate
AP radio
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests