SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Typically a point-to-multipoint link consists of ____ connections
Three
64-bit - 128-bit
Arp replay
6 -12 - and 24 Mbps
2. Management frames are sent in....
Bridge mode
11
Residential and Enterprise
Plaintext
3. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
HT fixed mode
Other 802.11a devices
WEP
25 MHz
4. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Beacons - Probe request - Probe response - Association Request - Reassociation Request
WEP
MAC
Monitor
5. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
BSSID (Basic Service Set identifier)
A VPN to the office network
Indoor and outdoor
Carefully plan a strategy using WEP and VLANs
6. The 802.11g standard uses which two speed spectrum technologies.
CCMP
Data rate increases
ERP-OFDM - DSSS
802.11g
7. In this mode - the card acts as a normal access point
Personal mode and Enterprise Mode
Data rate increases
Master
Authentication
8. The Layer 2 frame will be...
Extended Service Set (ESS)
802.11n
Unencrypted
MAC
9. What algorithm does WEP use
Wi-Fi Alliance
RC4
SSID and Channel
Interoperability testing organization
10. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
ISM
Other 802.11a devices
One or more
11. Which items are unique to a service set identifier
Greenfield mode
Data rate increases
RTS/CTS
32 character maximum and is case sensitive
12. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Automatically monitor the network for attacks
AES = CCMP required
CA - Collision avoidance
Wireless gateways
13. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Bridge mode
Independent
Access point
802.11r
14. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
14
Active mode
ARP spoofing
Fake auth
15. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Acknowledgement frames
MAC
ERP-OFDM - DSSS
Number of users and software applications in use
16. Collisions are detected through the use of....
Acknowledgement frames
HT 20 MHz protection mode
Height of an RF signal
PIN
17. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
Know the SSID and enter it manually
32
40 bit
18. 4 types of Denial of Service attacks
14
CTS attacks - Deauth attack - Association flood - Jamming
Height of an RF signal
Active mode
19. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
4 channels
11
Enter a username and password that will be central administered
40 bit
20. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
FHSS
Refraction
Data rate increases
Independent
21. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Quality of Service
Other 802.11a devices
Mesh network
Semi directional and Highly directional
22. 802.11b is capable of which data rates?
Acknowledgement frames
MAC
Amplitude and phase
1 - 5.5 and 11 Mbps
23. Name two relative measures of power
Interoperability testing organization
Transmitter and receiver
802.11
DB and dBi
24. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
DB and dBi
0
Addresses wireless Quality of Service
25. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
WPA/WPA2
Client
Three
802.11n
26. Wireless gateways come in two primary forms...
Passphrase
Master
Residential and Enterprise
AES = CCMP required
27. 802.11w can only be used in networks using_____
PIN
WPA/WPA2
WPA2
Workgroup Bridge mode.
28. This type of authentication is essentially 'Null authentication'
CTS attacks - Deauth attack - Association flood - Jamming
2.4-2.5GHz
Open system
Carefully plan a strategy using WEP and VLANs
29. 3 types of antennas
MAC
WPA2 -WEP
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Restricts access to authorized users
30. Which process is a VPN solution intended to provide for users connection to a network
Security
Secure Layer 3 transmissions over a public network infrastructure
SSID and Channel
4 channels
31. What item has an effect on RF line of site?
Obstacles
Fake auth
Security
Reflection
32. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
802.11r
Mesh
Number of users and software applications in use
33. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
22MHz wide
Encryption
34. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
Beacons - Probe request - Probe response - Association Request - Reassociation Request
802.11w
DB and dBi
35. What organization is responsible for unlicensed frequency band regulations in the United States?
6 -12 - and 24 Mbps
FCC
2304 bytes
One or more
36. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Monitor
Roaming
2304 bytes
Encryption
37. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Small Office/Home Office Organizations (SOHO)
Mismatched SSID
HT fixed mode
Passphrase
38. Probe requests are used by clients as part of the ____ process
Active scanning
Open system
Data rate increases
SOHO brands that support WPS
39. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Management
11
802.11b
Dynamic Rate switching
40. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Data rate increases
802.11b HR/DSSS and 802.11 DSSS
Single radio AP's
Reflection
41. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
SOHO brands that support WPS
Mesh
Degradation
42. The 802.11i amendment to the standard addresses which of the following technologies?
Security
Dual radio APs
Basic Service Set (BSS)
Two
43. What two devices use RF to communicate
Arp
Transmitter and receiver
Trojan/Rogue APs
Dynamic Rate switching
44. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Secure Layer 3 transmissions over a public network infrastructure
1 -6 -11
Fake auth
Degradation
45. Give two examples of WGB devices.
Management - control - data
Refraction
Passve Scanning
Wireless Game adapters and Media Bridges
46. What is the gain of an antenna measured in
DBi
Data rate increases
ERP-OFDM - DSSS
TKIP - optional RC4
47. A newly configured wireless intrusion prevention system will___
802.11b HR/DSSS and 802.11 DSSS
Open system and Shared key
Mesh network
Automatically monitor the network for attacks
48. The radio card can operate in one of up to six possible modes of operation...
Acknowledgement frames
Walled Garden.
Passphrase
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
49. Beacons allow client devices to ____ for available LANS
Passive scan
WPA2
CTS attacks - Deauth attack - Association flood - Jamming
Plaintext
50. 802.11g LAN operates in what frequency range?
Wavelength
2.4-2.5GHz
UNII
CCMP