Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A pre-shared key mode may be vulnerable to a ____ attack






2. This sets the card to participate in an independent basic service set






3. Collisions are detected through the use of....






4. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






5. In this mode a station can act as a relay or WLAN range extender






6. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






7. This is the default mode that sets the card as a client that could then connect to an AP






8. An independent basic service set (IBSS) consists of how many access points?






9. 802.11w can only be used in networks using_____






10. This is a topology in which two or more APs are connected by a common distribution system.






11. Three types of passive WEP attacks






12. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






13. an 802.11b 2.4GHz channel is how wide in MHz?






14. The process in which a wireless LAN clients connection moves from one access point to another is called ______






15. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






16. Which if the following organizations is responsible for standards compliance?






17. When a wireless LAN device listens for beacon frames - it is participating in which phase?






18. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






19. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






20. The open system authentication process uses how many frames?






21. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






22. The Layer 2 frame will be...






23. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






24. ___ are used to describe the basic components and topology of a WLAN






25. 802.11 frames have a maximum 'upper-layer' payload of...






26. 3 types of antennas






27. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.






28. What is regarded in 802.11e?






29. Probe requests are used by clients as part of the ____ process






30. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






31. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






32. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






33. The security amendment to the IEEE 802.11 standard requires ____






34. 4 types of Denial of Service attacks






35. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






36. The length of a WEP key is typically ___ or ___






37. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP






38. 802.11g LAN operates in what frequency range?






39. Which function does RBAC provide?






40. The ___ acts as a hub for the WLAN; wireless frame pass through this device






41. A newly configured wireless intrusion prevention system will___






42. The Access point can operate in a variety of modes...






43. Two characteristics of signals are






44. What kind of Algorithm does WPA2 use?






45. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






46. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






47. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






48. A basic service set identifier (BSSID) is the MAC address of the ____






49. Three types of MITM attacks






50. High throughput mode 2