SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. An independent basic service set (IBSS) consists of how many access points?
0
IPSec
Fake auth
802.11n
2. Three types of MITM attacks
Degradation
802.11i
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Beacons - Probe request - Probe response - Association Request - Reassociation Request
3. 802.11w can only be used in networks using_____
HT Non member protection mode
Fake auth
802.11i
WPA/WPA2
4. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Mesh
Interference from a neighboring access point RF denial-of-service (Dos) attack
WPA2
Independent
5. Probe requests are used by clients as part of the ____ process
Active scanning
802.11b
Wireless Game adapters and Media Bridges
Access point
6. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
7. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
802.11
Active scanning
Three
8. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
Wireless Game adapters and Media Bridges
Interoperability testing organization
Other 802.11a devices
9. The length of a WEP key is typically ___ or ___
Plaintext
Degradation
WPA Enterprise -WEP -MAC filters
64-bit - 128-bit
10. 3 types of frames
Trojan/Rogue APs - Arp spoofing - DNS spoofing
SSID (service set identifier)
AP to AP
Management - control - data
11. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Residential and Enterprise
Active scanning
Point-to-point link
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
12. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
802.11n
Know the SSID and enter it manually
Dictionary
13. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Obstacles
ERP protection
Frequency
Passive scan
14. What type of certification came from 802.11i
Authenticate - associate
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
WPA2
X.509 certificates on the subscriber side only.
15. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Fake auth
Passve Scanning
Frequency
Client
16. A ______________ does not always use an omnidirectional antenna
Captive portal
RC4
Point-to-point link
Single radio AP's
17. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
Antenna diversity
802.11b HR/DSSS and 802.11 DSSS
1 -6 -11
18. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
Extended Service Set (ESS)
AP to AP
Data rate increases
19. Aireplay-ng -1
Three
32 character maximum and is case sensitive
WEP
Fakeauth
20. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
64-bit - 128-bit
Personal mode and Enterprise Mode
802.11g
21. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
802.11w
WPA 2.0 personal and WPS
Degradation
22. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
Greenfield mode
Arp
3
23. Typically a point-to-multipoint link consists of ____ connections
One or more
Antenna diversity
Three
Wi-Fi Alliance
24. High throughput mode 2
SSID (service set identifier)
Transmitter and receiver
HT 20 MHz protection mode
Arp
25. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
802.11b HR/DSSS and 802.11 DSSS
Secure Layer 3 transmissions over a public network infrastructure
PIN
802.11i
26. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
22MHz wide
WPA/WPA2
Unencrypted
27. High Throughput mode 1
Residential and Enterprise
HT Non member protection mode
TKIP - optional RC4
Number of users and software applications in use
28. What best describes the Wi-Fi alliance?
Quality of Service
Walled Garden.
Interoperability testing organization
802.11
29. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Trojan/Rogue APs
Monitor
Arp
25 MHz
30. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
11
Amplitude and phase
Fakeauth
ARP spoofing
31. 3 types of antennas
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Open system
7
Management - control - data
32. According to the 802.11a amendment - which data rates are mandatory?
Trojan/Rogue APs
FCC
6 -12 - and 24 Mbps
FHSS
33. What is regarded in 802.11e?
ERP-OFDM - DSSS
Repeater
Enter a username and password that will be central administered
Addresses wireless Quality of Service
34. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
HT 20 MHz protection mode
Reflection
A VPN to the office network
DB and dBi
35. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Ad-Hoc
Deauth
Walled Garden.
36. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
Dual radio APs
Diffraction
Restricts access to authorized users
37. High Throughput mode 0
Fakeauth
Addresses wireless Quality of Service
Security
Greenfield mode
38. High throughput mode 3
802.11a
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Residential and Enterprise
HT fixed mode
39. Beacons allow client devices to ____ for available LANS
802.11r
Service sets
Passive scan
Repeater
40. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
OFDM
Data rate increases
DB and dBi
RTS/CTS
41. 802.11 uses CSMA/...
22MHz wide
CA - Collision avoidance
CTS attacks - Deauth attack - Association flood - Jamming
1 -6 -11
42. This is typically the 48-bit MAC address of the access point's radio card.
Active mode
Frequency
Service sets
BSSID (Basic Service Set identifier)
43. Which items are unique to a service set identifier
Repeater
Fake auth
32 character maximum and is case sensitive
Authenticate - associate
44. This sets the card to participate in an independent basic service set
Ad-Hoc
Station (STA)
WPA2
Degradation
45. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
Wavelength
Plaintext
Mesh
46. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
Repeater
Deauth
14
47. ___ are used to describe the basic components and topology of a WLAN
Height of an RF signal
Service sets
Know the SSID and enter it manually
1
48. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
LTE
Dual radio APs
SSID and Channel
UNII
49. Which if the following organizations is responsible for standards compliance?
Monitor
Access point
DB and dBi
Wi-Fi Alliance
50. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Interference from a neighboring access point RF denial-of-service (Dos) attack
802.11r
ISM