SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
WEP
Antenna diversity
FHSS
Dynamic Rate switching
2. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
WPA 2.0 personal and WPS
Captive portal
FHSS
3. Wireless gateways come in two primary forms...
AES = CCMP required
Station (STA)
Diffraction
Residential and Enterprise
4. 3 types of antennas
32 character maximum and is case sensitive
Unencrypted
Repeater
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
5. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Repeater
Reflection
Managed
Mismatched SSID
6. Layer 2 Tunneling Protocol commonly uses which encryption method?
22MHz wide
IPSec
11
Mesh network
7. What type of certification came from 802.11i
RC4
Unicast
Two
WPA2
8. Probe requests are used by clients as part of the ____ process
Quality of Service
Arp
Active scanning
Spoof an address
9. This type of authentication is essentially 'Null authentication'
Transmitter and receiver
HT 20 MHz protection mode
SSID (service set identifier)
Open system
10. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
1 - 5.5 and 11 Mbps
802.11g
Obstacles
RC4
11. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Personal mode and Enterprise Mode
Active scanning
Root mode
12. The association process happens after which phase?
Quality of Service
Three
Authentication
Master
13. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Independent
64-bit - 128-bit
14. Aireplay-ng -3
Arp replay
Mismatched SSID
Arp
Dual radio APs
15. 802.11g LAN operates in what frequency range?
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Degradation
Access point
2.4-2.5GHz
16. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Client
Two
802.11b
17. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
1
3
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
18. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Arp
Enter a username and password that will be central administered
Automatically monitor the network for attacks
Antenna diversity
19. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
20. An independent basic service set (IBSS) consists of how many access points?
MAC
0
Know the SSID and enter it manually
Interoperability testing organization
21. Three types of passive WEP attacks
Quality of Service
Service sets
WEP
Brute force - statistical and dictionary
22. Name two absolute measures of RF power
Passve Scanning
2.4-2.5GHz
Watt and mW
X.509 certificates on the subscriber side only.
23. WiMAX 802.16 authentication is based on...
0
AP to AP
Captive portal
X.509 certificates on the subscriber side only.
24. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11b
WPA Enterprise -WEP -MAC filters
Degradation
25. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Fake auth
Passphrase
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
ERP protection
26. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Ad-Hoc
Security
ERP-OFDM - DSSS
Indoor and outdoor
27. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
SOHO brands that support WPS
Carefully plan a strategy using WEP and VLANs
4 channels
Enter a username and password that will be central administered
28. This sets the card to participate in an independent basic service set
4 channels
1 - 5.5 and 11 Mbps
Ad-Hoc
CTS attacks - Deauth attack - Association flood - Jamming
29. Which function does RBAC provide?
Reflection
DB and dBi
Restricts access to authorized users
Indoor and outdoor
30. Bridge mode will not allow client associations and is ______ only
Managed
DB and dBi
RTS/CTS
AP to AP
31. In order to set up an ad hoc network a user must know which two parameters?
802.11r
Basic Service Set (BSS)
Unicast
SSID and Channel
32. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
802.11a
One or more
Automatically monitor the network for attacks
Other 802.11a devices
33. An Ack is expected for every____ frame transmitted
Wi-Fi Alliance
Unicast
Refraction
2304 bytes
34. Two characteristics of signals are
HT fixed mode
Amplitude and phase
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Passive scan
35. The length of a WEP key is typically ___ or ___
Watt and mW
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
64-bit - 128-bit
1
36. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
LTE
Reflection
HT Non member protection mode
Repeater
37. A basic service set identifier (BSSID) is the MAC address of the ____
A VPN to the office network
AP radio
Beacons - Probe request - Probe response - Association Request - Reassociation Request
One or more
38. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Unicast
Secure Layer 3 transmissions over a public network infrastructure
Basic Service Set (BSS)
WPA 2.0 personal and WPS
39. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Unencrypted
Root mode
ISM
40. What item has an effect on RF line of site?
Active scanning
Obstacles
40 bit
Interference from a neighboring access point RF denial-of-service (Dos) attack
41. Which security methods do 802.11g access points support?
WPA Enterprise -WEP -MAC filters
Antenna diversity
HT 20 MHz protection mode
Walled Garden.
42. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
WPA 2.0 personal and WPS
Antenna diversity
802.11b HR/DSSS and 802.11 DSSS
43. Three types of MITM attacks
Carefully plan a strategy using WEP and VLANs
Trojan/Rogue APs - Arp spoofing - DNS spoofing
802.11a
Security
44. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
Walled Garden.
X.509 certificates on the subscriber side only.
2.4-2.5GHz
45. What organization is responsible for unlicensed frequency band regulations in the United States?
6 -12 - and 24 Mbps
FCC
4 channels
Service sets
46. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Deauth
Greenfield mode
CCMP
Mismatched SSID
47. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Two
Semi directional and Highly directional
Repeater
11
48. Bluetooth uses a radio technology called
One or more
FHSS
Authentication
Security
49. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
32
Authenticate - associate
Wavelength
Authentication
50. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Reflection
SOHO brands that support WPS
802.11w
ERP protection