SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Quality of Service
ERP protection
Client
CA - Collision avoidance
2. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
Passive scan
Unicast
Managed
3. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
802.11n
OFDM
Management
7
4. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Management
802.11b
Interference from a neighboring access point RF denial-of-service (Dos) attack
Mesh network
5. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Typically a point-to-multipoint link consists of ____ connections
Obstacles
Three
4 channels
802.11g
7. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
CTS attacks - Deauth attack - Association flood - Jamming
Station (STA)
RC4
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
8. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Active mode
802.11b
Carefully plan a strategy using WEP and VLANs
7
9. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Authenticate - associate
4 channels
Station (STA)
WPA2
10. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Interference from a neighboring access point RF denial-of-service (Dos) attack
Deauth
OFDM
7
11. 802.11w can only be used in networks using_____
802.11i
Transmitter and receiver
Addresses wireless Quality of Service
WPA/WPA2
12. This is the default mode that sets the card as a client that could then connect to an AP
Managed
1 - 5.5 and 11 Mbps
Watt and mW
HT fixed mode
13. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
Unencrypted
Point-to-point link
Active scanning
14. an 802.11b 2.4GHz channel is how wide in MHz?
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
22MHz wide
Station (STA)
Wavelength
15. A station can act as a routing node in a wireless mesh network
Quality of Service
Fakeauth
1 - 5.5 and 11 Mbps
Mesh
16. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
Three
Single radio AP's
HT Non member protection mode
17. Which security feature provides the strongest security for a home-based wireless network?
Single radio AP's
Passphrase
Unicast
Trojan/Rogue APs
18. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
Wi-Fi Alliance
Mesh
X.509 certificates on the subscriber side only.
19. Probe requests are used by clients as part of the ____ process
Active scanning
Addresses wireless Quality of Service
Management - control - data
X.509 certificates on the subscriber side only.
20. A basic service set (BSS) consists of how many access points
Data rate increases
1
Service sets
DBi
21. What kind of Algorithm does WPA2 use?
AES = CCMP required
Fakeauth
Service sets
CA - Collision avoidance
22. 3 types of antennas
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Number of users and software applications in use
Root mode
Know the SSID and enter it manually
23. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Number of users and software applications in use
Indoor and outdoor
Residential and Enterprise
24. 802.11g LAN operates in what frequency range?
Semi directional and Highly directional
Spoof an address
Addresses wireless Quality of Service
2.4-2.5GHz
25. 802.11b is capable of which data rates?
Frequency
WPA 2.0 personal and WPS
Degradation
1 - 5.5 and 11 Mbps
26. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
802.11
Spoof an address
Passphrase
27. What two devices use RF to communicate
Arp replay
Transmitter and receiver
Antenna diversity
Three
28. A newly configured wireless intrusion prevention system will___
Active scanning
ERP protection
Captive portal
Automatically monitor the network for attacks
29. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Open system and Shared key
22MHz wide
Dynamic Rate switching
Management
30. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Root mode
Automatically monitor the network for attacks
AP radio
31. What type of certification came from 802.11i
WPA2
11
PIN
802.11n
32. High Throughput mode 1
HT Non member protection mode
Arp
ERP protection
Unicast
33. WiMAX 802.16 authentication is based on...
Antenna diversity
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Client
X.509 certificates on the subscriber side only.
34. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
UNII
Active scanning
Transmitter and receiver
MAC
35. A pre-shared key mode may be vulnerable to a ____ attack
1 -6 -11
Passive scan
Workgroup Bridge mode.
Dictionary
36. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
Data rate increases
Authentication
Amplitude and phase
37. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
1
Authenticate - associate
14
ERP protection
38. ___ are used to describe the basic components and topology of a WLAN
Deauth
Service sets
Degradation
Mesh
39. These are user configurable and present in only five 802.11 frame types...
Client
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Frequency
MAC
40. High throughput mode 2
Wireless Game adapters and Media Bridges
BSSID (Basic Service Set identifier)
HT 20 MHz protection mode
Trojan/Rogue APs
41. Two characteristics of signals are
Bridge mode
Spoof an address
Amplitude and phase
Restricts access to authorized users
42. What type of wireless network device is PIN-based security most commonly used with
Dictionary
Ad-Hoc
Access point
SOHO brands that support WPS
43. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Obstacles
Client
ISM
Antenna diversity
44. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Arp
Ad-Hoc
Client
Small Office/Home Office Organizations (SOHO)
45. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
WPA/WPA2
Two
802.11r
46. Three types of MITM attacks
22MHz wide
Wireless Game adapters and Media Bridges
Trojan/Rogue APs - Arp spoofing - DNS spoofing
RTS/CTS
47. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Dual radio APs
4 channels
Security
48. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
Number of users and software applications in use
AP to AP
Acknowledgement frames
49. This type of authentication is essentially 'Null authentication'
802.11n
Unencrypted
Open system
40 bit
50. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Extended Service Set (ESS)
14
HT Non member protection mode
11