Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






2. Which function does RBAC provide?






3. When RF passes or bends around an obstacle such as a building or column - the behavior is






4. What organization is responsible for unlicensed frequency band regulations in the United States?






5. What type of wireless network device is PIN-based security most commonly used with






6. Name two absolute measures of RF power






7. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?






8. 802.11 frames have a maximum 'upper-layer' payload of...






9. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






10. What kind of Algorithm does WPA2 use?






11. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






12. WI-Fi Protected Setup was designed for which of the following wireless applications?






13. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






14. What best describes the Wi-Fi alliance?






15. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking






16. High Throughput mode 1






17. Bridge mode will not allow client associations and is ______ only






18. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






19. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






20. A basic service set identifier (BSSID) is the MAC address of the ____






21. Aireplay-ng -3






22. 802.11w can only be used in networks using_____






23. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






24. WiMAX 802.16 authentication is based on...






25. Maximum length of data (Frame body) is 2304 when ____ is not in use






26. Which security feature provides the strongest security for a home-based wireless network?






27. Beacons allow client devices to ____ for available LANS






28. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






29. An independent basic service set (IBSS) consists of how many access points?






30. ____ is also known as the Protected management frame standard






31. 802.11 uses CSMA/...






32. Which if the following organizations is responsible for standards compliance?






33. High throughput mode 3






34. This is the default mode that sets the card as a client that could then connect to an AP






35. According to the 802.11a amendment - which data rates are mandatory?






36. A station can act as a routing node in a wireless mesh network






37. When a wireless LAN device listens for beacon frames - it is participating in which phase?






38. The length of a WEP key is typically ___ or ___






39. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?






40. In order to set up an ad hoc network a user must know which two parameters?






41. Both ___ and ___ are wireless LAN security methods that support shared key security.






42. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






43. Typically a point-to-multipoint link consists of ____ connections






44. A brute force attack is limited to breaking___ WEP keys






45. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






46. A weakness with MAC filtering is that it allows an intruder to ____






47. What type of algorithm does WPA use






48. This is a topology in which two or more APs are connected by a common distribution system.






49. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






50. This type of authentication is essentially 'Null authentication'