SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
ARP spoofing
Personal mode and Enterprise Mode
Extended Service Set (ESS)
Active scanning
2. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Indoor and outdoor
Two
SOHO brands that support WPS
Monitor
3. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
6 -12 - and 24 Mbps
11
Mesh network
Residential and Enterprise
4. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
UNII
Mismatched SSID
Degradation
IPSec
5. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
4 channels
Repeater
Three
Wavelength
6. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Master
ERP protection
Trojan/Rogue APs
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
7. The association process happens after which phase?
WEP
802.11g
HT Non member protection mode
Authentication
8. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Interference from a neighboring access point RF denial-of-service (Dos) attack
Dual radio APs
Three
Arp replay
9. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
HT fixed mode
AP to AP
Carefully plan a strategy using WEP and VLANs
Antenna diversity
10. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Enter a username and password that will be central administered
ARP spoofing
7
Greenfield mode
11. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Two
Bridge mode
802.11i
Spoof an address
12. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Small Office/Home Office Organizations (SOHO)
Refraction
Frequency
Fakeauth
13. What is regarded in 802.11e?
Indoor and outdoor
Addresses wireless Quality of Service
Open system
Arp
14. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Wireless gateways
PIN
AP radio
Mesh
15. ____ is also known as the Protected management frame standard
4 channels
Wi-Fi Alliance
Management - control - data
802.11w
16. Which security feature provides the strongest security for a home-based wireless network?
Mesh network
32 character maximum and is case sensitive
Passphrase
802.11g
17. This is typically the 48-bit MAC address of the access point's radio card.
802.11i
WEP
BSSID (Basic Service Set identifier)
802.11g
18. 802.11w can only be used in networks using_____
WPA/WPA2
Interoperability testing organization
Roaming
BSSID (Basic Service Set identifier)
19. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Mismatched SSID
802.11
Workgroup Bridge mode.
HT fixed mode
20. This sets the card to participate in an independent basic service set
Ad-Hoc
11
Dictionary
WPA2 -WEP
21. 3 types of frames
Management - control - data
Monitor
Ad-Hoc
Indoor and outdoor
22. Name two relative measures of power
ERP-OFDM - DSSS
Open system
DB and dBi
FHSS
23. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
SSID and Channel
Captive portal
Ad-Hoc
Wavelength
24. The capacity of an access point is dependent upon which factors?
802.11i
Client
Number of users and software applications in use
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
25. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Addresses wireless Quality of Service
Interference from a neighboring access point RF denial-of-service (Dos) attack
Three
Dynamic Rate switching
26. Three types of MITM attacks
2304 bytes
Trojan/Rogue APs - Arp spoofing - DNS spoofing
CA - Collision avoidance
802.11g
27. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Arp
Management
Antenna diversity
Workgroup Bridge mode.
28. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
1 - 5.5 and 11 Mbps
4 channels
Ad-Hoc
Plaintext
29. What two devices use RF to communicate
Restricts access to authorized users
Transmitter and receiver
Open system and Shared key
Amplitude and phase
30. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
RC4
Service sets
Client
Repeater
31. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Unencrypted
Interoperability testing organization
Arp replay
ISM
32. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
3
25 MHz
Dual radio APs
Mesh
33. Aireplay-ng -0
Passve Scanning
Deauth
11
Fake auth
34. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
35. Management frames are sent in....
Three
Addresses wireless Quality of Service
Plaintext
Open system
36. What best describes the Wi-Fi alliance?
Interoperability testing organization
CA - Collision avoidance
Bridge mode
WPA2
37. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Master
UNII
CTS attacks - Deauth attack - Association flood - Jamming
Number of users and software applications in use
38. An Ack is expected for every____ frame transmitted
Authenticate - associate
Unicast
Amplitude and phase
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
39. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
Encryption
Addresses wireless Quality of Service
WPA2 -WEP
40. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
AP radio
0
RTS/CTS
41. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Watt and mW
802.11r
FCC
WPA/WPA2
42. 802.11 uses CSMA/...
CA - Collision avoidance
Interoperability testing organization
DB and dBi
RC4
43. Name two absolute measures of RF power
Watt and mW
Managed
BSSID (Basic Service Set identifier)
802.11g
44. 802.11g LAN operates in what frequency range?
40 bit
Restricts access to authorized users
2.4-2.5GHz
Basic Service Set (BSS)
45. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Repeater
One or more
3
Open system and Shared key
46. Three types of passive WEP attacks
Active mode
802.11g
Wireless Game adapters and Media Bridges
Brute force - statistical and dictionary
47. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Monitor
Access point
LTE
WPA 2.0 personal and WPS
48. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Wireless Game adapters and Media Bridges
22MHz wide
AP radio
49. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
6 -12 - and 24 Mbps
3
OFDM
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
50. A weakness with MAC filtering is that it allows an intruder to ____
Independent
CA - Collision avoidance
PIN
Spoof an address