SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A ______________ does not always use an omnidirectional antenna
Unencrypted
A VPN to the office network
Wavelength
Point-to-point link
2. 802.11w can only be used in networks using_____
3
SSID (service set identifier)
WPA/WPA2
Active mode
3. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
WPA2
Enter a username and password that will be central administered
Amplitude and phase
Small Office/Home Office Organizations (SOHO)
4. The open system authentication process uses how many frames?
DB and dBi
4 channels
Two
1 -6 -11
5. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
Refraction
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Mesh
Acknowledgement frames
6. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
802.11r
AES = CCMP required
25 MHz
7. According to the 802.11a amendment - which data rates are mandatory?
Root mode
Semi directional and Highly directional
6 -12 - and 24 Mbps
0
8. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Roaming
Personal mode and Enterprise Mode
25 MHz
RTS/CTS
9. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
32
Height of an RF signal
Wi-Fi Alliance
10. In this mode - the card acts as a normal access point
Master
Single radio AP's
UNII
Client
11. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
WPA/WPA2
Roaming
A VPN to the office network
Arp replay
12. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Access point
One or more
Brute force - statistical and dictionary
Interoperability testing organization
13. In this mode a station can act as a relay or WLAN range extender
7
Repeater
1
Spoof an address
14. Which function does RBAC provide?
Fakeauth
Frequency
Restricts access to authorized users
Client
15. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
802.11a
Root mode
Other 802.11a devices
Trojan/Rogue APs
16. High throughput mode 3
Transmitter and receiver
One or more
TKIP - optional RC4
HT fixed mode
17. The Layer 2 frame will be...
DB and dBi
IPSec
Root mode
Unencrypted
18. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
Indoor and outdoor
Point-to-point link
LTE
19. Beacons allow client devices to ____ for available LANS
Antenna diversity
Unicast
Ad-Hoc
Passive scan
20. Which security feature provides the strongest security for a home-based wireless network?
2.4-2.5GHz
Know the SSID and enter it manually
IPSec
Passphrase
21. The association process happens after which phase?
Authentication
Number of users and software applications in use
HT 20 MHz protection mode
22MHz wide
22. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
OFDM
Arp
Enter a username and password that will be central administered
Monitor
23. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Spoof an address
Open system and Shared key
Refraction
LTE
24. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
FCC
ISM
Single radio AP's
802.11g
25. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Unicast
Two
Workgroup Bridge mode.
Deauth
26. The 802.11g standard uses which two speed spectrum technologies.
4 channels
7
MAC
ERP-OFDM - DSSS
27. What organization is responsible for unlicensed frequency band regulations in the United States?
Transmitter and receiver
Authenticate - associate
Watt and mW
FCC
28. What type of wireless network device is PIN-based security most commonly used with
HT 20 MHz protection mode
Arp
Automatically monitor the network for attacks
SOHO brands that support WPS
29. High throughput mode 2
Transmitter and receiver
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
HT 20 MHz protection mode
SSID and Channel
30. In order to set up an ad hoc network a user must know which two parameters?
Captive portal
ERP-OFDM - DSSS
SSID and Channel
802.11
31. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
WPA 2.0 personal and WPS
Restricts access to authorized users
Two
32. A service set identifier (SSID) has a maximum limit of how many characters?
Authenticate - associate
32
Basic Service Set (BSS)
FCC
33. What two devices use RF to communicate
Transmitter and receiver
Security
PIN
A VPN to the office network
34. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
802.11a
Client
Greenfield mode
HT 20 MHz protection mode
35. What item has an effect on RF line of site?
1 -6 -11
Wireless Game adapters and Media Bridges
Obstacles
Fakeauth
36. an 802.11b 2.4GHz channel is how wide in MHz?
One or more
22MHz wide
FCC
WPA/WPA2
37. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Brute force - statistical and dictionary
Active mode
Wavelength
Mesh network
38. Name 3 channels considered non overlapping in the 2.4GHZ band
2304 bytes
1 -6 -11
802.11g
Trojan/Rogue APs - Arp spoofing - DNS spoofing
39. High Throughput mode 1
AP to AP
HT Non member protection mode
Single radio AP's
ERP protection
40. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Acknowledgement frames
OFDM
Mismatched SSID
Frequency
41. 802.11 frames have a maximum 'upper-layer' payload of...
Restricts access to authorized users
1
2304 bytes
Active mode
42. Typically a point-to-multipoint link consists of ____ connections
Two
Three
Diffraction
Fakeauth
43. Bridge mode will not allow client associations and is ______ only
HT 20 MHz protection mode
WPA 2.0 personal and WPS
AP to AP
Deauth
44. Layer 2 Tunneling Protocol commonly uses which encryption method?
Access point
IPSec
Security
Service sets
45. This is a topology in which two or more APs are connected by a common distribution system.
Secure Layer 3 transmissions over a public network infrastructure
Unencrypted
Transmitter and receiver
Extended Service Set (ESS)
46. The capacity of an access point is dependent upon which factors?
AP to AP
FCC
Number of users and software applications in use
Personal mode and Enterprise Mode
47. ____ is also known as the Protected management frame standard
Encryption
802.11w
Interoperability testing organization
Brute force - statistical and dictionary
48. 802.11 uses CSMA/...
CA - Collision avoidance
2304 bytes
Management - control - data
X.509 certificates on the subscriber side only.
49. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
40 bit
Wavelength
Interference from a neighboring access point RF denial-of-service (Dos) attack
Active scanning
50. A brute force attack is limited to breaking___ WEP keys
40 bit
Authentication
Wireless gateways
Point-to-point link
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests