SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
Mesh network
802.11b HR/DSSS and 802.11 DSSS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
2. What type of wireless network device is PIN-based security most commonly used with
Passive scan
Dual radio APs
SOHO brands that support WPS
Walled Garden.
3. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
One or more
Refraction
64-bit - 128-bit
4. Management frames are sent in....
Monitor
Root mode
Plaintext
Independent
5. According to the 802.11a amendment - which data rates are mandatory?
Unicast
Dynamic Rate switching
Root mode
6 -12 - and 24 Mbps
6. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
Wi-Fi Alliance
802.11w
Client
7. Aireplay-ng -0
Encryption
802.11i
Deauth
ERP protection
8. Which items are unique to a service set identifier
32 character maximum and is case sensitive
Fake auth
A VPN to the office network
Residential and Enterprise
9. The length of a WEP key is typically ___ or ___
Wi-Fi Alliance
FHSS
64-bit - 128-bit
802.11b
10. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
11. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
22MHz wide
Antenna diversity
BSSID (Basic Service Set identifier)
Restricts access to authorized users
12. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Wireless gateways
4 channels
SSID and Channel
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
13. 3 types of frames
Spoof an address
Management - control - data
ISM
Greenfield mode
14. The Access point can operate in a variety of modes...
HT Non member protection mode
802.11b
AP radio
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
15. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Frequency
25 MHz
802.11b HR/DSSS and 802.11 DSSS
Personal mode and Enterprise Mode
16. the amplitude of an RF signal is
CA - Collision avoidance
Single radio AP's
WPA/WPA2
Height of an RF signal
17. Aireplay-ng -1
Fakeauth
Beacons - Probe request - Probe response - Association Request - Reassociation Request
HT 20 MHz protection mode
Master
18. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Arp
Captive portal
Trojan/Rogue APs
19. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Personal mode and Enterprise Mode
802.11i
1 -6 -11
Passve Scanning
20. A weakness with MAC filtering is that it allows an intruder to ____
AP to AP
Arp replay
DB and dBi
Spoof an address
21. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Dynamic Rate switching
BSSID (Basic Service Set identifier)
3
UNII
22. 3 types of antennas
Root mode
Passphrase
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Indoor and outdoor
23. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Authentication
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Personal mode and Enterprise Mode
24. Beacons allow client devices to ____ for available LANS
22MHz wide
Access point
UNII
Passive scan
25. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Repeater
Walled Garden.
Wireless gateways
802.11b
26. Point to Point links typically use which antenna types?
DBi
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Semi directional and Highly directional
Fake auth
27. In order to set up an ad hoc network a user must know which two parameters?
Active mode
ERP-OFDM - DSSS
SSID and Channel
1 -6 -11
28. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Wireless Game adapters and Media Bridges
Monitor
Interference from a neighboring access point RF denial-of-service (Dos) attack
Wi-Fi Alliance
29. Name 3 channels considered non overlapping in the 2.4GHZ band
1 -6 -11
One or more
802.11r
Deauth
30. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Secure Layer 3 transmissions over a public network infrastructure
Roaming
WPA 2.0 personal and WPS
31. The radio card can operate in one of up to six possible modes of operation...
WPA Enterprise -WEP -MAC filters
IPSec
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Monitor
32. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Client
Workgroup Bridge mode.
Dynamic Rate switching
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
33. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Refraction
Mesh network
14
Transmitter and receiver
34. High throughput mode 3
Plaintext
Secure Layer 3 transmissions over a public network infrastructure
HT fixed mode
WPA2
35. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
CA - Collision avoidance
Wavelength
Management - control - data
Mesh network
36. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
Transmitter and receiver
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Residential and Enterprise
37. What type of certification came from 802.11i
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
WPA2
802.11a
Enter a username and password that will be central administered
38. This is the default mode that sets the card as a client that could then connect to an AP
Managed
Plaintext
Two
Data rate increases
39. Three types of passive WEP attacks
6 -12 - and 24 Mbps
WPA 2.0 personal and WPS
Personal mode and Enterprise Mode
Brute force - statistical and dictionary
40. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Passve Scanning
WPA Enterprise -WEP -MAC filters
Repeater
Quality of Service
41. A pre-shared key mode may be vulnerable to a ____ attack
1 - 5.5 and 11 Mbps
AP to AP
Dictionary
Arp
42. When RF passes or bends around an obstacle such as a building or column - the behavior is
Mismatched SSID
Diffraction
Know the SSID and enter it manually
32 character maximum and is case sensitive
43. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
DB and dBi
WPA 2.0 personal and WPS
WPA Enterprise -WEP -MAC filters
Mismatched SSID
44. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
SSID and Channel
22MHz wide
Frequency
45. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
WEP
Carefully plan a strategy using WEP and VLANs
BSSID (Basic Service Set identifier)
Monitor
46. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
0
Wireless gateways
Mismatched SSID
11
47. In this mode a station can act as a relay or WLAN range extender
Managed
32 character maximum and is case sensitive
WPA 2.0 personal and WPS
Repeater
48. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Know the SSID and enter it manually
LTE
Wireless gateways
Quality of Service
49. A basic service set (BSS) consists of how many access points
1
PIN
Plaintext
Acknowledgement frames
50. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Roaming
PIN
Security