SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. High throughput mode 2
Plaintext
Passphrase
HT 20 MHz protection mode
AES = CCMP required
2. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
IPSec
Obstacles
CA - Collision avoidance
Degradation
3. The security amendment to the IEEE 802.11 standard requires ____
HT Non member protection mode
Arp
Trojan/Rogue APs
CCMP
4. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Fake auth
Management - control - data
UNII
Wireless gateways
5. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Fakeauth
802.11b HR/DSSS and 802.11 DSSS
7
ISM
6. Management frames are sent in....
Wireless Game adapters and Media Bridges
ARP spoofing
Plaintext
14
7. 3 types of antennas
Small Office/Home Office Organizations (SOHO)
WPA Enterprise -WEP -MAC filters
DB and dBi
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
8. 802.11a uses which spread spectrum technology?
Access point
Data rate increases
Trojan/Rogue APs
OFDM
9. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
WPA2 -WEP
HT 20 MHz protection mode
AP radio
Refraction
10. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Acknowledgement frames
4 channels
Addresses wireless Quality of Service
HT fixed mode
11. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Frequency
Other 802.11a devices
Roaming
WEP
12. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Mesh
Arp replay
802.11g
Dynamic Rate switching
13. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
HT fixed mode
802.11r
Watt and mW
OFDM
14. Collisions are detected through the use of....
OFDM
Encryption
Acknowledgement frames
Fake auth
15. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
WPA2
Interference from a neighboring access point RF denial-of-service (Dos) attack
32
Watt and mW
16. In bluetooth - one master may communicate with up to ___ slaves in a piconet
802.11a
7
802.11i
Fakeauth
17. an 802.11b 2.4GHz channel is how wide in MHz?
1 - 5.5 and 11 Mbps
802.11
DBi
22MHz wide
18. The radio card can operate in one of up to six possible modes of operation...
Dual radio APs
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
WEP
Workgroup Bridge mode.
19. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
7
Residential and Enterprise
Enter a username and password that will be central administered
Unicast
20. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Restricts access to authorized users
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
802.11r
21. 802.11 frames have a maximum 'upper-layer' payload of...
4 channels
2304 bytes
Open system
Residential and Enterprise
22. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
AP radio
Small Office/Home Office Organizations (SOHO)
Arp replay
23. Name two relative measures of power
802.11g
32
DB and dBi
Extended Service Set (ESS)
24. Three types of passive WEP attacks
Access point
Bridge mode
AP to AP
Brute force - statistical and dictionary
25. The process in which a wireless LAN clients connection moves from one access point to another is called ______
6 -12 - and 24 Mbps
Roaming
RC4
Encryption
26. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
40 bit
Dynamic Rate switching
Walled Garden.
Frequency
27. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Bridge mode
11
X.509 certificates on the subscriber side only.
Authentication
28. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Restricts access to authorized users
Authenticate - associate
Dictionary
BSSID (Basic Service Set identifier)
29. This sets the card to participate in an independent basic service set
Interference from a neighboring access point RF denial-of-service (Dos) attack
Ad-Hoc
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Automatically monitor the network for attacks
30. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
ERP protection
CCMP
Bridge mode
Station (STA)
31. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
Amplitude and phase
Addresses wireless Quality of Service
FHSS
32. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Arp replay
Mismatched SSID
BSSID (Basic Service Set identifier)
Security
33. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
Arp
Number of users and software applications in use
Security
34. High throughput mode 3
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Data rate increases
Amplitude and phase
HT fixed mode
35. In order to set up an ad hoc network a user must know which two parameters?
Trojan/Rogue APs
SSID and Channel
DBi
Automatically monitor the network for attacks
36. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
WPA Enterprise -WEP -MAC filters
Unencrypted
Walled Garden.
SSID (service set identifier)
37. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Carefully plan a strategy using WEP and VLANs
LTE
2304 bytes
38. An independent basic service set (IBSS) consists of how many access points?
Fakeauth
Service sets
Master
0
39. What is regarded in 802.11e?
ARP spoofing
Two
Addresses wireless Quality of Service
Trojan/Rogue APs
40. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Dual radio APs
Root mode
WPA 2.0 personal and WPS
Single radio AP's
41. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Roaming
WPA Enterprise -WEP -MAC filters
Indoor and outdoor
25 MHz
42. High Throughput mode 1
HT Non member protection mode
WPA 2.0 personal and WPS
Personal mode and Enterprise Mode
Refraction
43. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
44. What is the gain of an antenna measured in
Plaintext
Passive scan
DBi
X.509 certificates on the subscriber side only.
45. When an RF signal bounces off a smooth non absorptive surface - the behavior is
SSID and Channel
Workgroup Bridge mode.
Reflection
Diffraction
46. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Management
802.11n
OFDM
Roaming
47. An Ack is expected for every____ frame transmitted
Mesh
Unicast
Open system
Unencrypted
48. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
Enter a username and password that will be central administered
Authenticate - associate
X.509 certificates on the subscriber side only.
49. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Amplitude and phase
FHSS
Repeater
Access point
50. Aireplay-ng -3
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Arp
Wireless Game adapters and Media Bridges
Mesh network