SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The length of a WEP key is typically ___ or ___
Interference from a neighboring access point RF denial-of-service (Dos) attack
64-bit - 128-bit
ERP protection
Passive scan
2. Aireplay-ng -0
BSSID (Basic Service Set identifier)
Mesh network
802.11w
Deauth
3. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
22MHz wide
RTS/CTS
Personal mode and Enterprise Mode
802.11n
4. What best describes the Wi-Fi alliance?
Active mode
Interoperability testing organization
SOHO brands that support WPS
Addresses wireless Quality of Service
5. What algorithm does WEP use
AES = CCMP required
Trojan/Rogue APs
RC4
FHSS
6. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
Master
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
7. A newly configured wireless intrusion prevention system will___
Active mode
Captive portal
FHSS
Automatically monitor the network for attacks
8. 802.11 uses CSMA/...
Small Office/Home Office Organizations (SOHO)
AP radio
CA - Collision avoidance
SOHO brands that support WPS
9. This sets the card to participate in an independent basic service set
Repeater
802.11i
Ad-Hoc
RC4
10. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Access point
Automatically monitor the network for attacks
Fake auth
3
11. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
FHSS
ARP spoofing
Fakeauth
RTS/CTS
12. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Unencrypted
802.11b
Master
Trojan/Rogue APs
13. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
Beacons - Probe request - Probe response - Association Request - Reassociation Request
MAC
Mismatched SSID
14. Three types of passive WEP attacks
CA - Collision avoidance
Personal mode and Enterprise Mode
Arp
Brute force - statistical and dictionary
15. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
11
1
Captive portal
Watt and mW
16. In order to set up an ad hoc network a user must know which two parameters?
Refraction
Service sets
Beacons - Probe request - Probe response - Association Request - Reassociation Request
SSID and Channel
17. Typically a point-to-multipoint link consists of ____ connections
Independent
WPA/WPA2
Semi directional and Highly directional
Three
18. Name two absolute measures of RF power
AP to AP
Watt and mW
Passive scan
802.11a
19. Which function does RBAC provide?
6 -12 - and 24 Mbps
Passive scan
Restricts access to authorized users
DB and dBi
20. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Workgroup Bridge mode.
One or more
WPA/WPA2
7
21. 3 types of antennas
FHSS
Management - control - data
11
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
22. 802.11w can only be used in networks using_____
Point-to-point link
WPA/WPA2
Root mode
One or more
23. WI-Fi Protected Setup was designed for which of the following wireless applications?
Walled Garden.
Obstacles
Antenna diversity
Small Office/Home Office Organizations (SOHO)
24. The association process happens after which phase?
Authentication
Trojan/Rogue APs
Two
UNII
25. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
32 character maximum and is case sensitive
HT Non member protection mode
RC4
26. High Throughput mode 1
Wireless Game adapters and Media Bridges
Basic Service Set (BSS)
HT Non member protection mode
PIN
27. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Management - control - data
WPA2
SOHO brands that support WPS
Active mode
28. A service set identifier (SSID) has a maximum limit of how many characters?
Trojan/Rogue APs
32
TKIP - optional RC4
802.11a
29. What is the gain of an antenna measured in
Unicast
DBi
802.11a
Trojan/Rogue APs - Arp spoofing - DNS spoofing
30. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Obstacles
Reflection
Transmitter and receiver
Captive portal
31. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
HT 20 MHz protection mode
AP radio
Management
32. In this mode a station can act as a relay or WLAN range extender
SSID (service set identifier)
0
Access point
Repeater
33. Which if the following organizations is responsible for standards compliance?
LTE
Station (STA)
Two
Wi-Fi Alliance
34. What type of wireless network device is PIN-based security most commonly used with
802.11n
SOHO brands that support WPS
ERP-OFDM - DSSS
Workgroup Bridge mode.
35. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
Repeater
1
Trojan/Rogue APs - Arp spoofing - DNS spoofing
36. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
802.11b HR/DSSS and 802.11 DSSS
Frequency
Workgroup Bridge mode.
Mesh network
37. What item has an effect on RF line of site?
WPA 2.0 personal and WPS
Obstacles
802.11b HR/DSSS and 802.11 DSSS
Security
38. 802.11 frames have a maximum 'upper-layer' payload of...
Repeater
Walled Garden.
2304 bytes
32 character maximum and is case sensitive
39. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11n
SOHO brands that support WPS
802.11g
Other 802.11a devices
40. Point to Point links typically use which antenna types?
Personal mode and Enterprise Mode
Semi directional and Highly directional
MAC
Data rate increases
41. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Plaintext
Captive portal
ERP protection
Frequency
42. The process in which a wireless LAN clients connection moves from one access point to another is called ______
1
Know the SSID and enter it manually
Wi-Fi Alliance
Roaming
43. A station can act as a routing node in a wireless mesh network
Managed
ARP spoofing
Mesh
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
44. Bridge mode will not allow client associations and is ______ only
Workgroup Bridge mode.
AP to AP
Master
Monitor
45. What type of certification came from 802.11i
Automatically monitor the network for attacks
Mesh
14
WPA2
46. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Three
Management
802.11b HR/DSSS and 802.11 DSSS
Arp
47. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Other 802.11a devices
Monitor
Obstacles
TKIP - optional RC4
48. What is regarded in 802.11e?
Addresses wireless Quality of Service
11
Fakeauth
Passve Scanning
49. The Access point can operate in a variety of modes...
Beacons - Probe request - Probe response - Association Request - Reassociation Request
7
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
AP radio
50. ___ are used to describe the basic components and topology of a WLAN
Dynamic Rate switching
Walled Garden.
22MHz wide
Service sets