Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A brute force attack is limited to breaking___ WEP keys






2. Which items are unique to a service set identifier






3. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






4. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






5. Maximum length of data (Frame body) is 2304 when ____ is not in use






6. What organization is responsible for unlicensed frequency band regulations in the United States?






7. Management frames are sent in....






8. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






9. As a device moves away from an access point - what is true regarding dynamic rate switching?






10. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






11. Point to Point links typically use which antenna types?






12. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






13. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






14. The Layer 2 frame will be...






15. An independent basic service set (IBSS) consists of how many access points?






16. A service set identifier (SSID) has a maximum limit of how many characters?






17. What is regarded in 802.11e?






18. A basic service set identifier (BSSID) is the MAC address of the ____






19. WPA was developed as an interim solution for which amendment to the 802.11 standards?






20. Typically a point-to-multipoint link consists of ____ connections






21. 802.11 frames have a maximum 'upper-layer' payload of...






22. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






23. When an RF signal bounces off a smooth non absorptive surface - the behavior is






24. Name 3 channels considered non overlapping in the 2.4GHZ band






25. The 802.11g standard uses which two speed spectrum technologies.






26. 3 types of frames






27. What algorithm does WEP use






28. The Access point can operate in a variety of modes...






29. This type of authentication is essentially 'Null authentication'






30. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






31. WI-Fi Protected Setup was designed for which of the following wireless applications?






32. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






33. This is a topology in which two or more APs are connected by a common distribution system.






34. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






35. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






36. Which data encryption.authentication method is identified in the IEEE 802.11 standard






37. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






38. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






39. Layer 2 Tunneling Protocol commonly uses which encryption method?






40. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






41. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






42. A basic service set (BSS) consists of how many access points






43. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a






44. 3 types of antennas






45. The capacity of an access point is dependent upon which factors?






46. The security amendment to the IEEE 802.11 standard requires ____






47. Three types of passive WEP attacks






48. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






49. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






50. A ______________ does not always use an omnidirectional antenna