SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which function does RBAC provide?
Repeater
Antenna diversity
Restricts access to authorized users
SSID (service set identifier)
2. A brute force attack is limited to breaking___ WEP keys
WPA2 -WEP
Point-to-point link
AES = CCMP required
40 bit
3. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Wireless Game adapters and Media Bridges
802.11r
4. Maximum length of data (Frame body) is 2304 when ____ is not in use
Independent
Number of users and software applications in use
Enter a username and password that will be central administered
Encryption
5. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Wavelength
Diffraction
Point-to-point link
4 channels
6. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
FCC
Walled Garden.
OFDM
Brute force - statistical and dictionary
7. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
One or more
802.11g
Obstacles
Access point
8. What type of certification came from 802.11i
ISM
WPA2
TKIP - optional RC4
Mesh
9. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
Mesh
Passive scan
22MHz wide
10. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
Active scanning
Three
HT Non member protection mode
11. What algorithm does WEP use
802.11
Residential and Enterprise
RC4
Acknowledgement frames
12. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
ERP protection
Root mode
Authenticate - associate
MAC
13. High throughput mode 2
HT 20 MHz protection mode
Deauth
Basic Service Set (BSS)
AP radio
14. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
X.509 certificates on the subscriber side only.
Brute force - statistical and dictionary
Captive portal
WPA2 -WEP
15. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Fake auth
Encryption
Other 802.11a devices
16. WiMAX 802.16 authentication is based on...
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Active scanning
X.509 certificates on the subscriber side only.
Bridge mode
17. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
Mesh
Know the SSID and enter it manually
AP to AP
18. The capacity of an access point is dependent upon which factors?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Dual radio APs
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Number of users and software applications in use
19. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
LTE
Arp
Secure Layer 3 transmissions over a public network infrastructure
Arp replay
20. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
2304 bytes
Workgroup Bridge mode.
Dual radio APs
Bridge mode
21. What is regarded in 802.11e?
ERP protection
32 character maximum and is case sensitive
Wireless Game adapters and Media Bridges
Addresses wireless Quality of Service
22. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Know the SSID and enter it manually
ERP protection
802.11a
23. In order to set up an ad hoc network a user must know which two parameters?
7
Mesh network
WEP
SSID and Channel
24. In this mode a station can act as a relay or WLAN range extender
Know the SSID and enter it manually
802.11b HR/DSSS and 802.11 DSSS
Security
Repeater
25. 802.11 frames have a maximum 'upper-layer' payload of...
WPA2 -WEP
22MHz wide
FCC
2304 bytes
26. 802.11 uses CSMA/...
Two
7
WEP
CA - Collision avoidance
27. Management frames are sent in....
Repeater
Plaintext
Dynamic Rate switching
6 -12 - and 24 Mbps
28. Which security feature provides the strongest security for a home-based wireless network?
802.11i
Passphrase
Transmitter and receiver
Dynamic Rate switching
29. A station can act as a routing node in a wireless mesh network
AP radio
Antenna diversity
Mesh
Diffraction
30. Which security methods do 802.11g access points support?
Management - control - data
WPA Enterprise -WEP -MAC filters
802.11w
Degradation
31. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
802.11w
Monitor
OFDM
802.11i
32. The 802.11i amendment to the standard addresses which of the following technologies?
Data rate increases
Deauth
Security
802.11b
33. When RF passes or bends around an obstacle such as a building or column - the behavior is
40 bit
1
Diffraction
Residential and Enterprise
34. High Throughput mode 1
Transmitter and receiver
CTS attacks - Deauth attack - Association flood - Jamming
HT Non member protection mode
Walled Garden.
35. What item has an effect on RF line of site?
Obstacles
ERP-OFDM - DSSS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Workgroup Bridge mode.
36. In this mode - the card acts as a normal access point
FHSS
Master
2304 bytes
Addresses wireless Quality of Service
37. Bluetooth uses a radio technology called
FHSS
7
Interference from a neighboring access point RF denial-of-service (Dos) attack
1
38. What type of algorithm does WPA use
Trojan/Rogue APs
Root mode
Repeater
TKIP - optional RC4
39. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Authenticate - associate
Diffraction
1 - 5.5 and 11 Mbps
802.11i
40. What organization is responsible for unlicensed frequency band regulations in the United States?
Quality of Service
Monitor
FCC
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
41. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Point-to-point link
Fakeauth
LTE
Residential and Enterprise
42. A newly configured wireless intrusion prevention system will___
AP to AP
SSID (service set identifier)
WPA Enterprise -WEP -MAC filters
Automatically monitor the network for attacks
43. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA Enterprise -WEP -MAC filters
WPA 2.0 personal and WPS
WPA2 -WEP
Watt and mW
44. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
WPA2 -WEP
FHSS
Data rate increases
Authenticate - associate
45. What is the gain of an antenna measured in
DBi
AES = CCMP required
Wavelength
ISM
46. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
Unicast
Walled Garden.
Acknowledgement frames
47. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Service sets
Mesh network
CCMP
48. Collisions are detected through the use of....
802.11w
Know the SSID and enter it manually
Acknowledgement frames
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
49. Wireless gateways come in two primary forms...
Residential and Enterprise
Greenfield mode
Access point
Restricts access to authorized users
50. High Throughput mode 0
25 MHz
Security
Greenfield mode
CCMP
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests