Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






2. Point to Point links typically use which antenna types?






3. In this mode a station can act as a relay or WLAN range extender






4. 802.11 frames have a maximum 'upper-layer' payload of...






5. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






6. In repeater mode - the repeater device connects to a normal '___ mode'






7. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






8. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






9. Which security methods do 802.11g access points support?






10. A basic service set identifier (BSSID) is the MAC address of the ____






11. When RF passes or bends around an obstacle such as a building or column - the behavior is






12. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






13. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






14. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






15. A station can act as a routing node in a wireless mesh network






16. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






17. Three types of MITM attacks






18. This is a topology in which two or more APs are connected by a common distribution system.






19. What is the gain of an antenna measured in






20. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






21. What item has an effect on RF line of site?






22. Which process is a VPN solution intended to provide for users connection to a network






23. A basic service set (BSS) consists of how many access points






24. What is regarded in 802.11e?






25. Give two examples of WGB devices.






26. In order to set up an ad hoc network a user must know which two parameters?






27. Layer 2 Tunneling Protocol commonly uses which encryption method?






28. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






29. Bluetooth uses a radio technology called






30. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






31. What kind of Algorithm does WPA2 use?






32. The 802.11g standard uses which two speed spectrum technologies.






33. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






34. The length of a WEP key is typically ___ or ___






35. Aireplay-ng -1






36. High throughput mode 2






37. Which security feature provides the strongest security for a home-based wireless network?






38. An independent basic service set (IBSS) consists of how many access points?






39. Collisions are detected through the use of....






40. What two devices use RF to communicate






41. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi






42. This is the default mode that sets the card as a client that could then connect to an AP






43. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






44. This type of authentication is essentially 'Null authentication'






45. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






46. Two authentication types defined in the 802.11 standard






47. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






48. Wireless gateways come in two primary forms...






49. This is typically the 48-bit MAC address of the access point's radio card.






50. Typically a point-to-multipoint link consists of ____ connections