SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Unicast
SOHO brands that support WPS
Bridge mode
2. What is regarded in 802.11e?
Addresses wireless Quality of Service
ARP spoofing
Diffraction
MAC
3. These are user configurable and present in only five 802.11 frame types...
Access point
25 MHz
Mesh network
Beacons - Probe request - Probe response - Association Request - Reassociation Request
4. The Access point can operate in a variety of modes...
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Workgroup Bridge mode.
SOHO brands that support WPS
FCC
5. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Wireless Game adapters and Media Bridges
Mismatched SSID
MAC
WPA2 -WEP
6. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Secure Layer 3 transmissions over a public network infrastructure
Carefully plan a strategy using WEP and VLANs
802.11g
Walled Garden.
7. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
IPSec
Dual radio APs
1 - 5.5 and 11 Mbps
ISM
8. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Captive portal
Frequency
One or more
1
9. Beacons allow client devices to ____ for available LANS
2304 bytes
Plaintext
Passive scan
Access point
10. 3 types of frames
AES = CCMP required
Management - control - data
WPA2
1
11. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
HT Non member protection mode
Acknowledgement frames
Passphrase
Frequency
12. When RF passes or bends around an obstacle such as a building or column - the behavior is
2304 bytes
FCC
Unicast
Diffraction
13. An independent basic service set (IBSS) consists of how many access points?
0
FCC
WEP
3
14. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Deauth
Access point
CTS attacks - Deauth attack - Association flood - Jamming
Walled Garden.
15. 802.11w can only be used in networks using_____
Indoor and outdoor
WPA/WPA2
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
WPA Enterprise -WEP -MAC filters
16. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Station (STA)
802.11g
Watt and mW
Access point
17. Point to Point links typically use which antenna types?
Data rate increases
Residential and Enterprise
Semi directional and Highly directional
802.11i
18. A weakness with MAC filtering is that it allows an intruder to ____
Restricts access to authorized users
1 -6 -11
Spoof an address
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
19. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
FHSS
Indoor and outdoor
Know the SSID and enter it manually
11
20. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
ARP spoofing
One or more
RTS/CTS
21. High Throughput mode 0
DB and dBi
22MHz wide
Interference from a neighboring access point RF denial-of-service (Dos) attack
Greenfield mode
22. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
Dual radio APs
3
Passive scan
OFDM
23. A station can act as a routing node in a wireless mesh network
Semi directional and Highly directional
FCC
Diffraction
Mesh
24. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
2.4-2.5GHz
Access point
Secure Layer 3 transmissions over a public network infrastructure
RTS/CTS
25. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Dynamic Rate switching
Fakeauth
Arp replay
26. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Transmitter and receiver
WPA 2.0 personal and WPS
HT Non member protection mode
Roaming
27. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Acknowledgement frames
Reflection
Antenna diversity
Interoperability testing organization
28. Three types of passive WEP attacks
Brute force - statistical and dictionary
7
802.11n
Deauth
29. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Wi-Fi Alliance
Workgroup Bridge mode.
Secure Layer 3 transmissions over a public network infrastructure
Reflection
30. A pre-shared key mode may be vulnerable to a ____ attack
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Reflection
Dictionary
WPA Enterprise -WEP -MAC filters
31. Aireplay-ng -0
Active scanning
Automatically monitor the network for attacks
LTE
Deauth
32. A service set identifier (SSID) has a maximum limit of how many characters?
One or more
32
UNII
Diffraction
33. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Fakeauth
Station (STA)
Carefully plan a strategy using WEP and VLANs
Arp
34. Bluetooth uses a radio technology called
LTE
FHSS
Wi-Fi Alliance
Point-to-point link
35. Which process is a VPN solution intended to provide for users connection to a network
Personal mode and Enterprise Mode
Brute force - statistical and dictionary
Automatically monitor the network for attacks
Secure Layer 3 transmissions over a public network infrastructure
36. High throughput mode 3
Unencrypted
HT fixed mode
Dual radio APs
ERP-OFDM - DSSS
37. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
DB and dBi
X.509 certificates on the subscriber side only.
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
38. High Throughput mode 1
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
HT Non member protection mode
ARP spoofing
X.509 certificates on the subscriber side only.
39. Two characteristics of signals are
Reflection
Diffraction
WPA Enterprise -WEP -MAC filters
Amplitude and phase
40. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
Restricts access to authorized users
Interoperability testing organization
Roaming
41. Collisions are detected through the use of....
Active scanning
Acknowledgement frames
Two
Data rate increases
42. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Greenfield mode
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Repeater
43. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Fakeauth
HT 20 MHz protection mode
22MHz wide
802.11b HR/DSSS and 802.11 DSSS
44. What two devices use RF to communicate
Mesh
802.11b
Transmitter and receiver
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
45. Management frames are sent in....
CCMP
Plaintext
Passphrase
ISM
46. Which if the following organizations is responsible for standards compliance?
Wavelength
1
Wi-Fi Alliance
Small Office/Home Office Organizations (SOHO)
47. A newly configured wireless intrusion prevention system will___
802.11b
Automatically monitor the network for attacks
Wireless gateways
802.11r
48. Aireplay-ng -3
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Refraction
Arp
802.11a
49. A basic service set identifier (BSSID) is the MAC address of the ____
Data rate increases
AP radio
CA - Collision avoidance
Plaintext
50. What type of algorithm does WPA use
TKIP - optional RC4
CA - Collision avoidance
CTS attacks - Deauth attack - Association flood - Jamming
14