SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What item has an effect on RF line of site?
Indoor and outdoor
Authentication
Obstacles
802.11g
2. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
1 -6 -11
Degradation
Point-to-point link
802.11w
3. In this mode a station can act as a relay or WLAN range extender
SSID (service set identifier)
7
Repeater
CCMP
4. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
ERP protection
Antenna diversity
Single radio AP's
Fakeauth
5. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
HT Non member protection mode
Trojan/Rogue APs
4 channels
Dynamic Rate switching
6. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Amplitude and phase
WEP
Captive portal
ISM
7. In repeater mode - the repeater device connects to a normal '___ mode'
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Unencrypted
Quality of Service
Root mode
8. Three types of passive WEP attacks
Automatically monitor the network for attacks
BSSID (Basic Service Set identifier)
Brute force - statistical and dictionary
SOHO brands that support WPS
9. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
TKIP - optional RC4
Bridge mode
ERP protection
Authenticate - associate
10. The open system authentication process uses how many frames?
11
Repeater
Two
Amplitude and phase
11. Both ___ and ___ are wireless LAN security methods that support shared key security.
802.11r
WPA2 -WEP
SSID (service set identifier)
Spoof an address
12. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Basic Service Set (BSS)
HT fixed mode
One or more
Addresses wireless Quality of Service
13. The association process happens after which phase?
ERP-OFDM - DSSS
7
Authentication
Active mode
14. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
802.11b
CTS attacks - Deauth attack - Association flood - Jamming
Captive portal
Bridge mode
15. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Encryption
Monitor
802.11b HR/DSSS and 802.11 DSSS
Access point
16. Probe requests are used by clients as part of the ____ process
Active scanning
PIN
Plaintext
Access point
17. Which security feature provides the strongest security for a home-based wireless network?
Frequency
Passphrase
Security
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
18. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
OFDM
Personal mode and Enterprise Mode
Management
AES = CCMP required
19. Two authentication types defined in the 802.11 standard
Open system and Shared key
Walled Garden.
Obstacles
Semi directional and Highly directional
20. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
802.11g
Bridge mode
Access point
Enter a username and password that will be central administered
21. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Root mode
Residential and Enterprise
Point-to-point link
802.11b
22. A station can act as a routing node in a wireless mesh network
ERP protection
Bridge mode
Access point
Mesh
23. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Encryption
Open system
AP radio
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
24. Point to Point links typically use which antenna types?
Service sets
Semi directional and Highly directional
Encryption
Small Office/Home Office Organizations (SOHO)
25. A basic service set (BSS) consists of how many access points
HT 20 MHz protection mode
1
HT fixed mode
Reflection
26. What is regarded in 802.11e?
Open system
Repeater
Independent
Addresses wireless Quality of Service
27. Aireplay-ng -0
Roaming
Deauth
Active scanning
Interoperability testing organization
28. 802.11 uses CSMA/...
Walled Garden.
Service sets
RC4
CA - Collision avoidance
29. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Dual radio APs
WPA2
WPA/WPA2
Open system
30. 3 types of antennas
Station (STA)
HT Non member protection mode
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Deauth
31. The length of a WEP key is typically ___ or ___
64-bit - 128-bit
CCMP
11
Point-to-point link
32. Management frames are sent in....
Access point
Wavelength
Plaintext
Refraction
33. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Obstacles
ERP-OFDM - DSSS
Station (STA)
WPA2 -WEP
34. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Small Office/Home Office Organizations (SOHO)
Semi directional and Highly directional
CCMP
35. What algorithm does WEP use
RC4
Wireless Game adapters and Media Bridges
Repeater
OFDM
36. The Layer 2 frame will be...
Unencrypted
Passphrase
802.11b
RC4
37. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Management
Addresses wireless Quality of Service
A VPN to the office network
4 channels
38. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
Fake auth
ISM
Deauth
39. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
X.509 certificates on the subscriber side only.
Diffraction
Arp replay
AES = CCMP required
40. What two devices use RF to communicate
Point-to-point link
Transmitter and receiver
2.4-2.5GHz
Open system and Shared key
41. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Refraction
AES = CCMP required
WPA 2.0 personal and WPS
Extended Service Set (ESS)
42. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
1 -6 -11
Dynamic Rate switching
1 - 5.5 and 11 Mbps
Basic Service Set (BSS)
43. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Antenna diversity
Refraction
RC4
3
44. 802.11w can only be used in networks using_____
WPA/WPA2
Wavelength
Fakeauth
Arp replay
45. This type of authentication is essentially 'Null authentication'
Open system
Acknowledgement frames
Service sets
Access point
46. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Open system
WPA2 -WEP
Client
47. ___ are used to describe the basic components and topology of a WLAN
Extended Service Set (ESS)
Service sets
Master
Small Office/Home Office Organizations (SOHO)
48. When a wireless LAN device listens for beacon frames - it is participating in which phase?
802.11r
Passve Scanning
Mismatched SSID
RTS/CTS
49. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
64-bit - 128-bit
Workgroup Bridge mode.
Repeater
50. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
PIN
X.509 certificates on the subscriber side only.
802.11n
Master