SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Management
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Wireless gateways
Dual radio APs
2. What best describes the Wi-Fi alliance?
Interoperability testing organization
WPA2 -WEP
UNII
HT fixed mode
3. Which items are unique to a service set identifier
Quality of Service
Point-to-point link
32 character maximum and is case sensitive
DB and dBi
4. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Active mode
Mismatched SSID
HT 20 MHz protection mode
PIN
5. an 802.11b 2.4GHz channel is how wide in MHz?
Antenna diversity
Interference from a neighboring access point RF denial-of-service (Dos) attack
HT fixed mode
22MHz wide
6. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Carefully plan a strategy using WEP and VLANs
Root mode
Antenna diversity
11
7. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Access point
Service sets
7
Secure Layer 3 transmissions over a public network infrastructure
8. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
Client
Restricts access to authorized users
Number of users and software applications in use
9. The 802.11g standard uses which two speed spectrum technologies.
ERP-OFDM - DSSS
Wireless gateways
RC4
Access point
10. A ______________ does not always use an omnidirectional antenna
X.509 certificates on the subscriber side only.
Point-to-point link
Reflection
Bridge mode
11. This sets the card to participate in an independent basic service set
Three
LTE
Plaintext
Ad-Hoc
12. Aireplay-ng -3
Three
Single radio AP's
Arp
TKIP - optional RC4
13. What is the gain of an antenna measured in
IPSec
Wi-Fi Alliance
DBi
Client
14. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Dictionary
Basic Service Set (BSS)
802.11a
2304 bytes
15. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Unicast
Repeater
WPA 2.0 personal and WPS
1 -6 -11
16. 802.11 uses CSMA/...
Independent
802.11n
CA - Collision avoidance
Antenna diversity
17. Aireplay-ng -0
Deauth
Three
0
Trojan/Rogue APs
18. An independent basic service set (IBSS) consists of how many access points?
Encryption
0
Watt and mW
Monitor
19. 4 types of Denial of Service attacks
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Station (STA)
CTS attacks - Deauth attack - Association flood - Jamming
WPA2
20. The Layer 2 frame will be...
Unencrypted
Dynamic Rate switching
Client
FHSS
21. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
CTS attacks - Deauth attack - Association flood - Jamming
40 bit
Degradation
Acknowledgement frames
22. What type of algorithm does WPA use
Client
TKIP - optional RC4
WEP
Addresses wireless Quality of Service
23. Two characteristics of signals are
Refraction
Point-to-point link
Amplitude and phase
802.11g
24. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Management
Carefully plan a strategy using WEP and VLANs
802.11n
ARP spoofing
25. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Dynamic Rate switching
Wireless Game adapters and Media Bridges
Other 802.11a devices
Arp
26. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Encryption
Dynamic Rate switching
0
WPA Enterprise -WEP -MAC filters
27. Point to Point links typically use which antenna types?
2.4-2.5GHz
Frequency
BSSID (Basic Service Set identifier)
Semi directional and Highly directional
28. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
UNII
Ad-Hoc
802.11
LTE
29. Layer 2 Tunneling Protocol commonly uses which encryption method?
Spoof an address
32 character maximum and is case sensitive
14
IPSec
30. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
AP to AP
Brute force - statistical and dictionary
1 - 5.5 and 11 Mbps
31. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
Dictionary
WPA 2.0 personal and WPS
Transmitter and receiver
32. The association process happens after which phase?
WPA Enterprise -WEP -MAC filters
Authentication
Monitor
Passve Scanning
33. A weakness with MAC filtering is that it allows an intruder to ____
7
Spoof an address
Enter a username and password that will be central administered
Number of users and software applications in use
34. Bluetooth uses a radio technology called
OFDM
Secure Layer 3 transmissions over a public network infrastructure
FHSS
Wireless gateways
35. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Monitor
Passve Scanning
Restricts access to authorized users
Spoof an address
36. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
CA - Collision avoidance
Unicast
Amplitude and phase
Frequency
37. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Captive portal
Wavelength
Ad-Hoc
Refraction
38. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Root mode
Passve Scanning
Trojan/Rogue APs - Arp spoofing - DNS spoofing
39. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Plaintext
LTE
Automatically monitor the network for attacks
Semi directional and Highly directional
40. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
802.11b HR/DSSS and 802.11 DSSS
MAC
Fake auth
Dual radio APs
41. Three types of passive WEP attacks
Brute force - statistical and dictionary
1 - 5.5 and 11 Mbps
Carefully plan a strategy using WEP and VLANs
802.11b
42. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
43. Which security feature provides the strongest security for a home-based wireless network?
11
Passphrase
Master
Carefully plan a strategy using WEP and VLANs
44. Name two absolute measures of RF power
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Watt and mW
Personal mode and Enterprise Mode
ERP-OFDM - DSSS
45. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Mesh network
Other 802.11a devices
Semi directional and Highly directional
Bridge mode
46. Probe requests are used by clients as part of the ____ process
Active scanning
Service sets
Beacons - Probe request - Probe response - Association Request - Reassociation Request
1 -6 -11
47. Which function does RBAC provide?
25 MHz
Restricts access to authorized users
2304 bytes
Passve Scanning
48. Name two relative measures of power
14
3
DB and dBi
Active scanning
49. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wireless gateways
Automatically monitor the network for attacks
BSSID (Basic Service Set identifier)
Wavelength
50. Which process is a VPN solution intended to provide for users connection to a network
HT Non member protection mode
Secure Layer 3 transmissions over a public network infrastructure
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Spoof an address