SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Personal mode and Enterprise Mode
FCC
Service sets
802.11i
2. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Access point
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
DBi
3. Aireplay-ng -3
Wireless gateways
ERP-OFDM - DSSS
Personal mode and Enterprise Mode
Arp
4. Name 3 channels considered non overlapping in the 2.4GHZ band
Data rate increases
802.11w
1 -6 -11
ARP spoofing
5. The length of a WEP key is typically ___ or ___
802.11
WEP
64-bit - 128-bit
Passve Scanning
6. 802.11b is capable of which data rates?
Trojan/Rogue APs
1 - 5.5 and 11 Mbps
Other 802.11a devices
40 bit
7. According to the 802.11a amendment - which data rates are mandatory?
6 -12 - and 24 Mbps
Walled Garden.
Semi directional and Highly directional
Authentication
8. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
RC4
Dynamic Rate switching
ERP-OFDM - DSSS
4 channels
9. A brute force attack is limited to breaking___ WEP keys
40 bit
802.11g
Active scanning
AP radio
10. ___ are used to describe the basic components and topology of a WLAN
Arp replay
Service sets
14
Transmitter and receiver
11. A service set identifier (SSID) has a maximum limit of how many characters?
Unicast
Management
32
Antenna diversity
12. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Obstacles
7
1
Basic Service Set (BSS)
13. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Workgroup Bridge mode.
4 channels
Three
Enter a username and password that will be central administered
14. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
CA - Collision avoidance
Carefully plan a strategy using WEP and VLANs
Wi-Fi Alliance
ERP protection
15. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
WPA2
802.11a
LTE
WPA Enterprise -WEP -MAC filters
16. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Obstacles
WPA Enterprise -WEP -MAC filters
14
ARP spoofing
17. The 802.11g standard uses which two speed spectrum technologies.
Automatically monitor the network for attacks
Diffraction
6 -12 - and 24 Mbps
ERP-OFDM - DSSS
18. Layer 2 Tunneling Protocol commonly uses which encryption method?
802.11i
Antenna diversity
IPSec
Spoof an address
19. Management frames are sent in....
CCMP
CA - Collision avoidance
Plaintext
RTS/CTS
20. High throughput mode 2
Managed
802.11i
Open system and Shared key
HT 20 MHz protection mode
21. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
SOHO brands that support WPS
Wireless gateways
Data rate increases
802.11a
22. What type of certification came from 802.11i
6 -12 - and 24 Mbps
Spoof an address
LTE
WPA2
23. These are user configurable and present in only five 802.11 frame types...
6 -12 - and 24 Mbps
WPA/WPA2
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Bridge mode
24. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
HT Non member protection mode
Data rate increases
Service sets
Arp replay
25. Point to Point links typically use which antenna types?
64-bit - 128-bit
32
Passive scan
Semi directional and Highly directional
26. 802.11w can only be used in networks using_____
WPA/WPA2
Unicast
Small Office/Home Office Organizations (SOHO)
ISM
27. In this mode - the card acts as a normal access point
Master
WPA2 -WEP
802.11b HR/DSSS and 802.11 DSSS
Access point
28. 3 types of antennas
OFDM
ERP-OFDM - DSSS
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Wireless Game adapters and Media Bridges
29. This is a topology in which two or more APs are connected by a common distribution system.
22MHz wide
Interference from a neighboring access point RF denial-of-service (Dos) attack
WPA/WPA2
Extended Service Set (ESS)
30. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
TKIP - optional RC4
Diffraction
25 MHz
ISM
31. Which security methods do 802.11g access points support?
Passve Scanning
Carefully plan a strategy using WEP and VLANs
WPA Enterprise -WEP -MAC filters
Amplitude and phase
32. A weakness with MAC filtering is that it allows an intruder to ____
802.11
802.11a
Spoof an address
WPA/WPA2
33. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
34. In repeater mode - the repeater device connects to a normal '___ mode'
RTS/CTS
Root mode
Enter a username and password that will be central administered
Secure Layer 3 transmissions over a public network infrastructure
35. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
ERP protection
Addresses wireless Quality of Service
Mesh network
36. The open system authentication process uses how many frames?
Two
25 MHz
Deauth
Obstacles
37. What is regarded in 802.11e?
Addresses wireless Quality of Service
14
802.11g
AP radio
38. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Point-to-point link
Unencrypted
Frequency
Root mode
39. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Refraction
Independent
Trojan/Rogue APs
Arp replay
40. An Ack is expected for every____ frame transmitted
Three
Repeater
Unicast
Arp
41. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Single radio AP's
Greenfield mode
Wavelength
42. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Wi-Fi Alliance
802.11
Mesh network
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
43. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Arp
Quality of Service
Master
25 MHz
44. A ______________ does not always use an omnidirectional antenna
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Wireless Game adapters and Media Bridges
Point-to-point link
Monitor
45. When a wireless LAN device listens for beacon frames - it is participating in which phase?
LTE
ISM
Watt and mW
Passve Scanning
46. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Know the SSID and enter it manually
Open system
Brute force - statistical and dictionary
14
47. Give two examples of WGB devices.
Mismatched SSID
Authentication
BSSID (Basic Service Set identifier)
Wireless Game adapters and Media Bridges
48. This sets the card to participate in an independent basic service set
802.11b
0
Small Office/Home Office Organizations (SOHO)
Ad-Hoc
49. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Single radio AP's
CA - Collision avoidance
MAC
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
50. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Root mode
ISM
802.11i
7