SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Indoor and outdoor
Enter a username and password that will be central administered
MAC
Quality of Service
2. An Ack is expected for every____ frame transmitted
Dual radio APs
2304 bytes
Unicast
Station (STA)
3. A ______________ does not always use an omnidirectional antenna
Point-to-point link
2.4-2.5GHz
Number of users and software applications in use
Captive portal
4. Both ___ and ___ are wireless LAN security methods that support shared key security.
Unicast
WPA2 -WEP
Reflection
WPA/WPA2
5. A newly configured wireless intrusion prevention system will___
6 -12 - and 24 Mbps
Mismatched SSID
Automatically monitor the network for attacks
LTE
6. What is regarded in 802.11e?
Plaintext
Enter a username and password that will be central administered
Unicast
Addresses wireless Quality of Service
7. Name 3 channels considered non overlapping in the 2.4GHZ band
Access point
Greenfield mode
1 -6 -11
WPA/WPA2
8. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
6 -12 - and 24 Mbps
Know the SSID and enter it manually
Trojan/Rogue APs - Arp spoofing - DNS spoofing
FCC
9. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
Arp replay
Trojan/Rogue APs
Basic Service Set (BSS)
10. When an RF signal bounces off a smooth non absorptive surface - the behavior is
WPA2 -WEP
Interference from a neighboring access point RF denial-of-service (Dos) attack
22MHz wide
Reflection
11. Which function does RBAC provide?
Roaming
Restricts access to authorized users
Point-to-point link
0
12. This type of authentication is essentially 'Null authentication'
Open system
MAC
3
Carefully plan a strategy using WEP and VLANs
13. Which items are unique to a service set identifier
ERP protection
Three
32 character maximum and is case sensitive
Client
14. Probe requests are used by clients as part of the ____ process
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
802.11g
Active scanning
Arp replay
15. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Wireless Game adapters and Media Bridges
7
1 -6 -11
16. A brute force attack is limited to breaking___ WEP keys
Ad-Hoc
40 bit
802.11b
Data rate increases
17. In order to set up an ad hoc network a user must know which two parameters?
RC4
Arp replay
A VPN to the office network
SSID and Channel
18. The capacity of an access point is dependent upon which factors?
Fake auth
7
Number of users and software applications in use
Diffraction
19. A pre-shared key mode may be vulnerable to a ____ attack
Dictionary
1 -6 -11
Open system and Shared key
Roaming
20. Bridge mode will not allow client associations and is ______ only
ISM
UNII
Extended Service Set (ESS)
AP to AP
21. What kind of Algorithm does WPA2 use?
Indoor and outdoor
TKIP - optional RC4
AES = CCMP required
Beacons - Probe request - Probe response - Association Request - Reassociation Request
22. High throughput mode 2
Authenticate - associate
HT 20 MHz protection mode
Passve Scanning
MAC
23. The security amendment to the IEEE 802.11 standard requires ____
Know the SSID and enter it manually
Master
CCMP
Semi directional and Highly directional
24. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
7
32
Repeater
LTE
25. High throughput mode 3
Open system and Shared key
Service sets
HT fixed mode
Transmitter and receiver
26. 3 types of antennas
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Extended Service Set (ESS)
Number of users and software applications in use
WPA 2.0 personal and WPS
27. WiMAX 802.16 authentication is based on...
Management
X.509 certificates on the subscriber side only.
3
Mesh network
28. 802.11w can only be used in networks using_____
ERP protection
WPA/WPA2
Trojan/Rogue APs
RTS/CTS
29. Name two relative measures of power
DB and dBi
3
2304 bytes
Automatically monitor the network for attacks
30. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Deauth
LTE
Extended Service Set (ESS)
Independent
31. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Obstacles
WEP
802.11a
32. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
2.4-2.5GHz
Reflection
Walled Garden.
Authenticate - associate
33. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Secure Layer 3 transmissions over a public network infrastructure
Small Office/Home Office Organizations (SOHO)
PIN
Fake auth
34. An independent basic service set (IBSS) consists of how many access points?
Master
WPA 2.0 personal and WPS
Service sets
0
35. Bluetooth uses a radio technology called
Antenna diversity
FHSS
CA - Collision avoidance
CCMP
36. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
MAC
14
Bridge mode
Repeater
37. The association process happens after which phase?
32
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Authentication
AP to AP
38. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Monitor
UNII
OFDM
64-bit - 128-bit
39. The open system authentication process uses how many frames?
Independent
Access point
Two
Arp
40. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Brute force - statistical and dictionary
One or more
Extended Service Set (ESS)
Arp replay
41. The Layer 2 frame will be...
2304 bytes
Fakeauth
Carefully plan a strategy using WEP and VLANs
Unencrypted
42. 802.11b is capable of which data rates?
Dual radio APs
Fake auth
Interference from a neighboring access point RF denial-of-service (Dos) attack
1 - 5.5 and 11 Mbps
43. This is the default mode that sets the card as a client that could then connect to an AP
X.509 certificates on the subscriber side only.
Managed
Beacons - Probe request - Probe response - Association Request - Reassociation Request
UNII
44. Which security methods do 802.11g access points support?
802.11r
Diffraction
WPA Enterprise -WEP -MAC filters
RTS/CTS
45. This sets the card to participate in an independent basic service set
Unencrypted
7
Ad-Hoc
Secure Layer 3 transmissions over a public network infrastructure
46. Which security feature provides the strongest security for a home-based wireless network?
Access point
Passphrase
Passve Scanning
Repeater
47. The length of a WEP key is typically ___ or ___
0
64-bit - 128-bit
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Brute force - statistical and dictionary
48. What type of wireless network device is PIN-based security most commonly used with
HT Non member protection mode
ERP-OFDM - DSSS
Interoperability testing organization
SOHO brands that support WPS
49. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
AP radio
802.11r
Ad-Hoc
50. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
ERP-OFDM - DSSS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Greenfield mode
Root mode