SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
CA - Collision avoidance
ERP protection
802.11b
FCC
2. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
11
CTS attacks - Deauth attack - Association flood - Jamming
AES = CCMP required
3. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Passphrase
Basic Service Set (BSS)
BSSID (Basic Service Set identifier)
Wi-Fi Alliance
4. A newly configured wireless intrusion prevention system will___
Basic Service Set (BSS)
Addresses wireless Quality of Service
HT 20 MHz protection mode
Automatically monitor the network for attacks
5. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Captive portal
WPA 2.0 personal and WPS
SSID (service set identifier)
Workgroup Bridge mode.
6. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Quality of Service
X.509 certificates on the subscriber side only.
Carefully plan a strategy using WEP and VLANs
2.4-2.5GHz
7. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Root mode
ISM
Passve Scanning
0
8. In order to set up an ad hoc network a user must know which two parameters?
802.11b HR/DSSS and 802.11 DSSS
SSID and Channel
Mesh network
4 channels
9. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
6 -12 - and 24 Mbps
Open system and Shared key
ERP-OFDM - DSSS
Walled Garden.
10. Probe requests are used by clients as part of the ____ process
CA - Collision avoidance
One or more
Security
Active scanning
11. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Mismatched SSID
Wavelength
Roaming
802.11r
12. 802.11b is capable of which data rates?
Reflection
AES = CCMP required
MAC
1 - 5.5 and 11 Mbps
13. Three types of passive WEP attacks
802.11b HR/DSSS and 802.11 DSSS
Brute force - statistical and dictionary
Active mode
Captive portal
14. ___ are used to describe the basic components and topology of a WLAN
Service sets
Fakeauth
7
WPA Enterprise -WEP -MAC filters
15. When an RF signal bounces off a smooth non absorptive surface - the behavior is
RC4
Two
Workgroup Bridge mode.
Reflection
16. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Quality of Service
Open system and Shared key
Carefully plan a strategy using WEP and VLANs
17. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
Authenticate - associate
Number of users and software applications in use
A VPN to the office network
18. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
1 - 5.5 and 11 Mbps
Root mode
Watt and mW
19. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
TKIP - optional RC4
802.11w
Wireless gateways
802.11a
20. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Access point
HT Non member protection mode
22MHz wide
Repeater
21. A weakness with MAC filtering is that it allows an intruder to ____
CTS attacks - Deauth attack - Association flood - Jamming
A VPN to the office network
Extended Service Set (ESS)
Spoof an address
22. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
HT 20 MHz protection mode
Arp replay
Automatically monitor the network for attacks
Degradation
23. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Refraction
WEP
Active mode
24. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
RTS/CTS
Enter a username and password that will be central administered
Arp replay
25. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Amplitude and phase
Roaming
WPA 2.0 personal and WPS
AP radio
26. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
A VPN to the office network
1 - 5.5 and 11 Mbps
Amplitude and phase
Unicast
27. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
WPA/WPA2
1 -6 -11
Management
28. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
Two
RC4
BSSID (Basic Service Set identifier)
29. Name 3 channels considered non overlapping in the 2.4GHZ band
Workgroup Bridge mode.
1 -6 -11
802.11i
4 channels
30. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Arp
802.11
Root mode
Repeater
31. What is regarded in 802.11e?
Diffraction
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Addresses wireless Quality of Service
Client
32. Bridge mode will not allow client associations and is ______ only
802.11a
AP to AP
Number of users and software applications in use
0
33. High throughput mode 3
802.11a
HT fixed mode
Small Office/Home Office Organizations (SOHO)
Monitor
34. The open system authentication process uses how many frames?
Two
UNII
802.11n
Bridge mode
35. The length of a WEP key is typically ___ or ___
Master
64-bit - 128-bit
CCMP
6 -12 - and 24 Mbps
36. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
802.11i
11
Quality of Service
7
37. Which items are unique to a service set identifier
32 character maximum and is case sensitive
0
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Other 802.11a devices
38. WI-Fi Protected Setup was designed for which of the following wireless applications?
Automatically monitor the network for attacks
Encryption
Independent
Small Office/Home Office Organizations (SOHO)
39. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
32 character maximum and is case sensitive
802.11w
WPA2 -WEP
Active mode
40. What is the gain of an antenna measured in
64-bit - 128-bit
DBi
Dual radio APs
Data rate increases
41. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Automatically monitor the network for attacks
Personal mode and Enterprise Mode
AES = CCMP required
42. A basic service set identifier (BSSID) is the MAC address of the ____
Three
RTS/CTS
AP radio
Security
43. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
1 -6 -11
Restricts access to authorized users
Secure Layer 3 transmissions over a public network infrastructure
44. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Active scanning
14
Secure Layer 3 transmissions over a public network infrastructure
Enter a username and password that will be central administered
45. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Arp
802.11g
Point-to-point link
Know the SSID and enter it manually
46. An independent basic service set (IBSS) consists of how many access points?
Passve Scanning
0
AP to AP
Transmitter and receiver
47. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Repeater
Interference from a neighboring access point RF denial-of-service (Dos) attack
Spoof an address
ERP-OFDM - DSSS
48. Name two absolute measures of RF power
Know the SSID and enter it manually
Authenticate - associate
Watt and mW
Height of an RF signal
49. Aireplay-ng -1
Fakeauth
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
CTS attacks - Deauth attack - Association flood - Jamming
Amplitude and phase
50. Typically a point-to-multipoint link consists of ____ connections
Height of an RF signal
WPA 2.0 personal and WPS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Three