SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A weakness with MAC filtering is that it allows an intruder to ____
Single radio AP's
Small Office/Home Office Organizations (SOHO)
Master
Spoof an address
2. Three types of passive WEP attacks
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Ad-Hoc
Arp replay
Brute force - statistical and dictionary
3. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
BSSID (Basic Service Set identifier)
6 -12 - and 24 Mbps
802.11a
RTS/CTS
4. High Throughput mode 0
PIN
Greenfield mode
CTS attacks - Deauth attack - Association flood - Jamming
Transmitter and receiver
5. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
HT fixed mode
3
X.509 certificates on the subscriber side only.
802.11i
6. When a wireless LAN device listens for beacon frames - it is participating in which phase?
CTS attacks - Deauth attack - Association flood - Jamming
Encryption
Independent
Passve Scanning
7. This sets the card to participate in an independent basic service set
Ad-Hoc
Automatically monitor the network for attacks
6 -12 - and 24 Mbps
Service sets
8. WPA was developed as an interim solution for which amendment to the 802.11 standards?
WPA2
X.509 certificates on the subscriber side only.
Client
802.11i
9. Which process is a VPN solution intended to provide for users connection to a network
4 channels
Passphrase
Secure Layer 3 transmissions over a public network infrastructure
Master
10. Name two relative measures of power
802.11
FCC
DB and dBi
DBi
11. Maximum length of data (Frame body) is 2304 when ____ is not in use
Mesh network
Encryption
Workgroup Bridge mode.
Arp
12. What organization is responsible for unlicensed frequency band regulations in the United States?
14
Walled Garden.
FCC
CCMP
13. an 802.11b 2.4GHz channel is how wide in MHz?
Secure Layer 3 transmissions over a public network infrastructure
22MHz wide
Degradation
Active scanning
14. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Fakeauth
3
ERP protection
Secure Layer 3 transmissions over a public network infrastructure
15. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Personal mode and Enterprise Mode
Encryption
ERP-OFDM - DSSS
A VPN to the office network
16. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
BSSID (Basic Service Set identifier)
LTE
802.11b
Authenticate - associate
17. The capacity of an access point is dependent upon which factors?
Extended Service Set (ESS)
Number of users and software applications in use
Enter a username and password that will be central administered
Client
18. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Wi-Fi Alliance
32 character maximum and is case sensitive
Small Office/Home Office Organizations (SOHO)
11
19. In bluetooth - one master may communicate with up to ___ slaves in a piconet
7
UNII
Passve Scanning
Interoperability testing organization
20. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Wi-Fi Alliance
32 character maximum and is case sensitive
Single radio AP's
Fake auth
21. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
802.11g
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
One or more
22. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Watt and mW
TKIP - optional RC4
Bridge mode
RTS/CTS
23. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Deauth
Number of users and software applications in use
Know the SSID and enter it manually
RC4
24. ____ is also known as the Protected management frame standard
3
Open system
X.509 certificates on the subscriber side only.
802.11w
25. Two characteristics of signals are
Amplitude and phase
Residential and Enterprise
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Passve Scanning
26. A brute force attack is limited to breaking___ WEP keys
Station (STA)
Open system and Shared key
40 bit
2.4-2.5GHz
27. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Diffraction
1 - 5.5 and 11 Mbps
Managed
Wavelength
28. 802.11 uses CSMA/...
Restricts access to authorized users
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
CA - Collision avoidance
6 -12 - and 24 Mbps
29. A ______________ does not always use an omnidirectional antenna
AP radio
Point-to-point link
Managed
Three
30. Which data encryption.authentication method is identified in the IEEE 802.11 standard
WEP
2304 bytes
DB and dBi
ERP-OFDM - DSSS
31. The radio card can operate in one of up to six possible modes of operation...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
AP radio
DB and dBi
DBi
32. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
One or more
Carefully plan a strategy using WEP and VLANs
Repeater
Walled Garden.
33. What two devices use RF to communicate
Passive scan
Transmitter and receiver
WPA2
FCC
34. What kind of Algorithm does WPA2 use?
SSID (service set identifier)
Open system
AES = CCMP required
Master
35. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
Repeater
Fake auth
4 channels
36. Layer 2 Tunneling Protocol commonly uses which encryption method?
40 bit
2.4-2.5GHz
Mesh
IPSec
37. What best describes the Wi-Fi alliance?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
WPA2
CA - Collision avoidance
Interoperability testing organization
38. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Passphrase
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Authenticate - associate
Diffraction
39. Which function does RBAC provide?
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Passive scan
Restricts access to authorized users
Quality of Service
40. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Authenticate - associate
14
Reflection
ISM
41. What type of wireless network device is PIN-based security most commonly used with
Service sets
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
SOHO brands that support WPS
WPA 2.0 personal and WPS
42. What is the gain of an antenna measured in
0
Mesh
DBi
Independent
43. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Amplitude and phase
Spoof an address
Antenna diversity
Dynamic Rate switching
44. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
802.11i
802.11w
RTS/CTS
45. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
Deauth
CA - Collision avoidance
2.4-2.5GHz
46. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Point-to-point link
Carefully plan a strategy using WEP and VLANs
Semi directional and Highly directional
Refraction
47. When an RF signal bounces off a smooth non absorptive surface - the behavior is
PIN
Ad-Hoc
Reflection
Semi directional and Highly directional
48. Bridge mode will not allow client associations and is ______ only
AP to AP
Residential and Enterprise
802.11w
One or more
49. The security amendment to the IEEE 802.11 standard requires ____
40 bit
14
A VPN to the office network
CCMP
50. In this mode a station can act as a relay or WLAN range extender
Repeater
ARP spoofing
Other 802.11a devices
DB and dBi
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests