SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
AES = CCMP required
Mismatched SSID
11
2. The Access point can operate in a variety of modes...
2.4-2.5GHz
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
40 bit
Open system and Shared key
3. A basic service set identifier (BSSID) is the MAC address of the ____
Encryption
Walled Garden.
802.11g
AP radio
4. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
ISM
Active mode
Captive portal
25 MHz
5. This sets the card to participate in an independent basic service set
AES = CCMP required
Independent
Mesh
Ad-Hoc
6. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Amplitude and phase
4 channels
Security
Basic Service Set (BSS)
7. The process in which a wireless LAN clients connection moves from one access point to another is called ______
A VPN to the office network
Basic Service Set (BSS)
2.4-2.5GHz
Roaming
8. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Repeater
32
Brute force - statistical and dictionary
ERP protection
9. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
WPA/WPA2
Wireless Game adapters and Media Bridges
Station (STA)
10. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Open system and Shared key
Know the SSID and enter it manually
Dictionary
UNII
11. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
FHSS
Fake auth
ISM
7
12. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Passphrase
Bridge mode
Plaintext
Extended Service Set (ESS)
13. When an RF signal bounces off a smooth non absorptive surface - the behavior is
AES = CCMP required
Diffraction
Mismatched SSID
Reflection
14. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Management - control - data
Single radio AP's
Wireless gateways
Frequency
15. Bridge mode will not allow client associations and is ______ only
AP to AP
Data rate increases
Management - control - data
Trojan/Rogue APs
16. the amplitude of an RF signal is
PIN
Obstacles
22MHz wide
Height of an RF signal
17. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Arp
Carefully plan a strategy using WEP and VLANs
UNII
Captive portal
18. Give two examples of WGB devices.
Antenna diversity
Diffraction
Captive portal
Wireless Game adapters and Media Bridges
19. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Single radio AP's
14
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Dual radio APs
20. The Layer 2 frame will be...
Unencrypted
Dual radio APs
Extended Service Set (ESS)
Security
21. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Basic Service Set (BSS)
Walled Garden.
2.4-2.5GHz
32
22. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Three
Dynamic Rate switching
Antenna diversity
6 -12 - and 24 Mbps
23. Aireplay-ng -1
Mismatched SSID
Fakeauth
BSSID (Basic Service Set identifier)
1
24. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
32 character maximum and is case sensitive
Repeater
802.11b HR/DSSS and 802.11 DSSS
25. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
AES = CCMP required
Know the SSID and enter it manually
Monitor
Access point
26. Two authentication types defined in the 802.11 standard
RTS/CTS
Open system and Shared key
Greenfield mode
32 character maximum and is case sensitive
27. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
AES = CCMP required
Active scanning
Degradation
MAC
28. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
ERP-OFDM - DSSS
HT fixed mode
OFDM
29. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Encryption
Passve Scanning
Refraction
Enter a username and password that will be central administered
30. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Spoof an address
CTS attacks - Deauth attack - Association flood - Jamming
Independent
OFDM
31. This type of authentication is essentially 'Null authentication'
Fakeauth
Open system
Independent
0
32. 3 types of antennas
WPA 2.0 personal and WPS
UNII
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Degradation
33. Aireplay-ng -3
Arp
WPA2 -WEP
Dual radio APs
Open system
34. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Mesh
Client
Trojan/Rogue APs
AES = CCMP required
35. A weakness with MAC filtering is that it allows an intruder to ____
Authenticate - associate
Spoof an address
DB and dBi
Monitor
36. Management frames are sent in....
Plaintext
Small Office/Home Office Organizations (SOHO)
Restricts access to authorized users
Passve Scanning
37. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
Spoof an address
ERP protection
Extended Service Set (ESS)
38. The association process happens after which phase?
OFDM
Acknowledgement frames
Authenticate - associate
Authentication
39. Aireplay-ng -0
Enter a username and password that will be central administered
Deauth
Personal mode and Enterprise Mode
1 - 5.5 and 11 Mbps
40. High Throughput mode 0
TKIP - optional RC4
Greenfield mode
SSID and Channel
Security
41. 802.11 uses CSMA/...
CA - Collision avoidance
Authentication
Passphrase
Quality of Service
42. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Master
802.11w
AES = CCMP required
Carefully plan a strategy using WEP and VLANs
43. ____ is also known as the Protected management frame standard
Repeater
802.11w
14
Wi-Fi Alliance
44. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
SSID (service set identifier)
Root mode
Dictionary
Indoor and outdoor
45. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
2304 bytes
Point-to-point link
Other 802.11a devices
WPA2 -WEP
46. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Unicast
Extended Service Set (ESS)
Access point
Enter a username and password that will be central administered
47. What is regarded in 802.11e?
CTS attacks - Deauth attack - Association flood - Jamming
Addresses wireless Quality of Service
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
7
48. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
WPA2 -WEP
1
SSID (service set identifier)
Semi directional and Highly directional
49. The radio card can operate in one of up to six possible modes of operation...
BSSID (Basic Service Set identifier)
1
2.4-2.5GHz
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
50. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Dual radio APs
Service sets
Workgroup Bridge mode.
Dictionary