SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
DB and dBi
3
SOHO brands that support WPS
2. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
802.11n
Master
Independent
3. Which security feature provides the strongest security for a home-based wireless network?
Authenticate - associate
Passphrase
DB and dBi
Dictionary
4. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Passphrase
802.11
Passve Scanning
11
5. In this mode - the card acts as a normal access point
Reflection
Master
AES = CCMP required
UNII
6. In this mode a station can act as a relay or WLAN range extender
UNII
Unencrypted
DB and dBi
Repeater
7. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Active mode
HT Non member protection mode
Station (STA)
Unicast
8. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
HT Non member protection mode
Basic Service Set (BSS)
Quality of Service
Security
9. Name two absolute measures of RF power
802.11b
Watt and mW
Passive scan
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
10. This is a topology in which two or more APs are connected by a common distribution system.
Active scanning
Active mode
Extended Service Set (ESS)
Residential and Enterprise
11. Typically a point-to-multipoint link consists of ____ connections
Mismatched SSID
Amplitude and phase
HT fixed mode
Three
12. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
64-bit - 128-bit
32 character maximum and is case sensitive
3
13. An Ack is expected for every____ frame transmitted
0
Unicast
Indoor and outdoor
Encryption
14. What type of algorithm does WPA use
3
TKIP - optional RC4
LTE
Open system and Shared key
15. Layer 2 Tunneling Protocol commonly uses which encryption method?
Arp
HT Non member protection mode
UNII
IPSec
16. Which data encryption.authentication method is identified in the IEEE 802.11 standard
WEP
Access point
ERP-OFDM - DSSS
Independent
17. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Managed
Refraction
LTE
18. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
WEP
Mismatched SSID
Captive portal
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
19. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Mismatched SSID
Other 802.11a devices
Access point
Bridge mode
20. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
11
AP radio
Personal mode and Enterprise Mode
Obstacles
21. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
11
40 bit
Authenticate - associate
Trojan/Rogue APs
22. Maximum length of data (Frame body) is 2304 when ____ is not in use
Antenna diversity
MAC
Encryption
32 character maximum and is case sensitive
23. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
Three
HT 20 MHz protection mode
Wireless gateways
24. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Captive portal
Active mode
ERP protection
BSSID (Basic Service Set identifier)
25. Aireplay-ng -0
ERP-OFDM - DSSS
Deauth
40 bit
Mismatched SSID
26. High Throughput mode 0
Greenfield mode
RTS/CTS
FCC
3
27. 802.11g LAN operates in what frequency range?
Degradation
ERP protection
RC4
2.4-2.5GHz
28. High throughput mode 2
Root mode
Managed
Wavelength
HT 20 MHz protection mode
29. What is the gain of an antenna measured in
Passphrase
Station (STA)
DBi
UNII
30. 802.11a uses which spread spectrum technology?
Wi-Fi Alliance
OFDM
WPA2 -WEP
802.11n
31. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Refraction
802.11r
A VPN to the office network
32. Name two relative measures of power
Data rate increases
TKIP - optional RC4
DB and dBi
802.11g
33. This sets the card to participate in an independent basic service set
1 -6 -11
One or more
Ad-Hoc
Service sets
34. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Unencrypted
Other 802.11a devices
Open system and Shared key
Wavelength
35. 802.11 uses CSMA/...
Independent
CA - Collision avoidance
Point-to-point link
AP radio
36. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Enter a username and password that will be central administered
7
802.11g
Residential and Enterprise
37. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
DBi
Walled Garden.
Restricts access to authorized users
38. the amplitude of an RF signal is
Trojan/Rogue APs
Bridge mode
Height of an RF signal
Plaintext
39. What is regarded in 802.11e?
PIN
Amplitude and phase
SSID (service set identifier)
Addresses wireless Quality of Service
40. A basic service set identifier (BSSID) is the MAC address of the ____
64-bit - 128-bit
WPA/WPA2
AP radio
Roaming
41. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
WPA2 -WEP
Independent
AES = CCMP required
42. Bridge mode will not allow client associations and is ______ only
AP to AP
WPA Enterprise -WEP -MAC filters
Interference from a neighboring access point RF denial-of-service (Dos) attack
Management
43. The association process happens after which phase?
Roaming
Repeater
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Authentication
44. A weakness with MAC filtering is that it allows an intruder to ____
802.11w
ERP protection
Interference from a neighboring access point RF denial-of-service (Dos) attack
Spoof an address
45. The Layer 2 frame will be...
Restricts access to authorized users
SOHO brands that support WPS
Unencrypted
Enter a username and password that will be central administered
46. A service set identifier (SSID) has a maximum limit of how many characters?
Quality of Service
32
Wavelength
Repeater
47. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
HT Non member protection mode
Authentication
Deauth
802.11n
48. This is the default mode that sets the card as a client that could then connect to an AP
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Spoof an address
Managed
Point-to-point link
49. A pre-shared key mode may be vulnerable to a ____ attack
Active scanning
Carefully plan a strategy using WEP and VLANs
Dictionary
Reflection
50. Beacons allow client devices to ____ for available LANS
Two
TKIP - optional RC4
WPA2 -WEP
Passive scan