SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Semi directional and Highly directional
Spoof an address
802.11i
Captive portal
2. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
WPA Enterprise -WEP -MAC filters
Fake auth
4 channels
DBi
3. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
A VPN to the office network
802.11n
LTE
RC4
4. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Personal mode and Enterprise Mode
802.11n
FCC
Station (STA)
5. In this mode a station can act as a relay or WLAN range extender
Repeater
802.11w
Walled Garden.
Trojan/Rogue APs - Arp spoofing - DNS spoofing
6. Which items are unique to a service set identifier
Watt and mW
32 character maximum and is case sensitive
Know the SSID and enter it manually
22MHz wide
7. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Frequency
Trojan/Rogue APs - Arp spoofing - DNS spoofing
WPA2 -WEP
Passve Scanning
8. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Root mode
Dictionary
Mismatched SSID
MAC
9. A newly configured wireless intrusion prevention system will___
Client
6 -12 - and 24 Mbps
Fakeauth
Automatically monitor the network for attacks
10. WI-Fi Protected Setup was designed for which of the following wireless applications?
6 -12 - and 24 Mbps
Small Office/Home Office Organizations (SOHO)
Repeater
DB and dBi
11. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
Watt and mW
4 channels
802.11b HR/DSSS and 802.11 DSSS
12. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
1 - 5.5 and 11 Mbps
HT Non member protection mode
Monitor
Open system and Shared key
13. High throughput mode 2
HT 20 MHz protection mode
WPA Enterprise -WEP -MAC filters
Point-to-point link
Basic Service Set (BSS)
14. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
Wavelength
Restricts access to authorized users
Client
15. Aireplay-ng -0
32 character maximum and is case sensitive
Dictionary
Know the SSID and enter it manually
Deauth
16. Bluetooth uses a radio technology called
FHSS
AP radio
Management - control - data
Restricts access to authorized users
17. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Brute force - statistical and dictionary
Secure Layer 3 transmissions over a public network infrastructure
Managed
18. the amplitude of an RF signal is
Diffraction
802.11b HR/DSSS and 802.11 DSSS
802.11a
Height of an RF signal
19. A brute force attack is limited to breaking___ WEP keys
40 bit
22MHz wide
Managed
Mesh
20. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
32
Client
Carefully plan a strategy using WEP and VLANs
Secure Layer 3 transmissions over a public network infrastructure
21. Which security methods do 802.11g access points support?
40 bit
Security
WPA Enterprise -WEP -MAC filters
IPSec
22. Two characteristics of signals are
2304 bytes
Authenticate - associate
Amplitude and phase
Residential and Enterprise
23. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Carefully plan a strategy using WEP and VLANs
Wavelength
Brute force - statistical and dictionary
24. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
FHSS
Indoor and outdoor
1 -6 -11
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
25. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Restricts access to authorized users
Independent
Greenfield mode
UNII
26. What type of certification came from 802.11i
Enter a username and password that will be central administered
Active scanning
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
WPA2
27. Typically a point-to-multipoint link consists of ____ connections
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Root mode
Addresses wireless Quality of Service
Three
28. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Transmitter and receiver
Unicast
3
Personal mode and Enterprise Mode
29. Point to Point links typically use which antenna types?
Dynamic Rate switching
Semi directional and Highly directional
Secure Layer 3 transmissions over a public network infrastructure
FHSS
30. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
1
Watt and mW
64-bit - 128-bit
Trojan/Rogue APs
31. This is typically the 48-bit MAC address of the access point's radio card.
FHSS
Passphrase
BSSID (Basic Service Set identifier)
Point-to-point link
32. What type of algorithm does WPA use
Open system
TKIP - optional RC4
DB and dBi
Passve Scanning
33. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
AES = CCMP required
Quality of Service
Addresses wireless Quality of Service
25 MHz
34. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
4 channels
Fake auth
Know the SSID and enter it manually
HT Non member protection mode
35. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Frequency
Bridge mode
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Repeater
36. Bridge mode will not allow client associations and is ______ only
PIN
BSSID (Basic Service Set identifier)
LTE
AP to AP
37. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Management
Deauth
Roaming
SSID and Channel
38. When RF passes or bends around an obstacle such as a building or column - the behavior is
802.11w
BSSID (Basic Service Set identifier)
LTE
Diffraction
39. A ______________ does not always use an omnidirectional antenna
Point-to-point link
Secure Layer 3 transmissions over a public network infrastructure
Interference from a neighboring access point RF denial-of-service (Dos) attack
Refraction
40. The open system authentication process uses how many frames?
Wavelength
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Two
Wireless Game adapters and Media Bridges
41. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
WEP
802.11b
Dynamic Rate switching
DB and dBi
42. Both ___ and ___ are wireless LAN security methods that support shared key security.
Client
ERP-OFDM - DSSS
2304 bytes
WPA2 -WEP
43. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Monitor
TKIP - optional RC4
Interference from a neighboring access point RF denial-of-service (Dos) attack
Reflection
44. What is the gain of an antenna measured in
Ad-Hoc
DBi
Two
Three
45. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
AES = CCMP required
Workgroup Bridge mode.
802.11r
Mesh
46. Name 3 channels considered non overlapping in the 2.4GHZ band
Greenfield mode
Client
Wi-Fi Alliance
1 -6 -11
47. An independent basic service set (IBSS) consists of how many access points?
0
TKIP - optional RC4
UNII
SSID (service set identifier)
48. Wireless gateways come in two primary forms...
One or more
Fakeauth
Mismatched SSID
Residential and Enterprise
49. Which data encryption.authentication method is identified in the IEEE 802.11 standard
WEP
Two
FCC
Arp
50. The Access point can operate in a variety of modes...
Station (STA)
LTE
Deauth
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.