SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is a topology in which two or more APs are connected by a common distribution system.
Addresses wireless Quality of Service
Extended Service Set (ESS)
AP to AP
Reflection
2. Aireplay-ng -3
WEP
Point-to-point link
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Arp
3. A station can act as a routing node in a wireless mesh network
Single radio AP's
Mesh
2304 bytes
Authentication
4. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Frequency
Restricts access to authorized users
Indoor and outdoor
AP to AP
5. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
Wavelength
Dual radio APs
WPA Enterprise -WEP -MAC filters
6. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
802.11b HR/DSSS and 802.11 DSSS
Authenticate - associate
Single radio AP's
7. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Mesh
Walled Garden.
X.509 certificates on the subscriber side only.
Roaming
8. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
FCC
Trojan/Rogue APs
Authentication
Mesh network
9. The Access point can operate in a variety of modes...
Repeater
CCMP
Active scanning
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
10. Three types of passive WEP attacks
Brute force - statistical and dictionary
802.11i
Indoor and outdoor
25 MHz
11. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Service sets
Antenna diversity
Enter a username and password that will be central administered
Interoperability testing organization
12. the amplitude of an RF signal is
Management - control - data
Height of an RF signal
Other 802.11a devices
1
13. Beacons allow client devices to ____ for available LANS
Interoperability testing organization
802.11b HR/DSSS and 802.11 DSSS
2.4-2.5GHz
Passive scan
14. What type of certification came from 802.11i
Active scanning
Addresses wireless Quality of Service
WPA2
802.11n
15. Both ___ and ___ are wireless LAN security methods that support shared key security.
1
WPA2 -WEP
CCMP
Amplitude and phase
16. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
40 bit
3
Mesh
17. Bridge mode will not allow client associations and is ______ only
HT 20 MHz protection mode
0
UNII
AP to AP
18. The radio card can operate in one of up to six possible modes of operation...
Open system
LTE
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
HT 20 MHz protection mode
19. WI-Fi Protected Setup was designed for which of the following wireless applications?
Small Office/Home Office Organizations (SOHO)
ISM
Open system
Security
20. The 802.11i amendment to the standard addresses which of the following technologies?
Small Office/Home Office Organizations (SOHO)
Security
Degradation
Interoperability testing organization
21. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Carefully plan a strategy using WEP and VLANs
Fakeauth
Brute force - statistical and dictionary
802.11r
22. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Basic Service Set (BSS)
Bridge mode
Other 802.11a devices
Interference from a neighboring access point RF denial-of-service (Dos) attack
23. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Authenticate - associate
22MHz wide
ISM
Captive portal
24. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Degradation
One or more
Carefully plan a strategy using WEP and VLANs
25. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Two
Quality of Service
ARP spoofing
Diffraction
26. High throughput mode 2
Frequency
Dynamic Rate switching
HT 20 MHz protection mode
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
27. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Root mode
Number of users and software applications in use
Captive portal
802.11
28. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
802.11w
Passphrase
Fakeauth
ERP protection
29. Which function does RBAC provide?
Ad-Hoc
Restricts access to authorized users
One or more
CA - Collision avoidance
30. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Station (STA)
802.11b
Dictionary
Active mode
31. When a wireless LAN device listens for beacon frames - it is participating in which phase?
64-bit - 128-bit
Passve Scanning
Repeater
Diffraction
32. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
14
ERP-OFDM - DSSS
Wavelength
64-bit - 128-bit
33. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
CCMP
Repeater
Mesh network
34. 802.11g LAN operates in what frequency range?
802.11a
Unicast
2.4-2.5GHz
802.11w
35. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Walled Garden.
Fake auth
1
ARP spoofing
36. Which items are unique to a service set identifier
LTE
Frequency
TKIP - optional RC4
32 character maximum and is case sensitive
37. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Degradation
SSID (service set identifier)
Reflection
Mesh network
38. In this mode - the card acts as a normal access point
Access point
Master
TKIP - optional RC4
Extended Service Set (ESS)
39. Name two relative measures of power
Fakeauth
DB and dBi
802.11b
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
40. WiMAX 802.16 authentication is based on...
CTS attacks - Deauth attack - Association flood - Jamming
802.11b HR/DSSS and 802.11 DSSS
Acknowledgement frames
X.509 certificates on the subscriber side only.
41. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
LTE
32
Reflection
42. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Deauth
DBi
Frequency
Greenfield mode
43. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
RC4
LTE
Height of an RF signal
Security
44. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
Management - control - data
1 - 5.5 and 11 Mbps
40 bit
45. High Throughput mode 0
AP to AP
Authentication
Greenfield mode
802.11b HR/DSSS and 802.11 DSSS
46. The Layer 2 frame will be...
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Unencrypted
X.509 certificates on the subscriber side only.
CA - Collision avoidance
47. An independent basic service set (IBSS) consists of how many access points?
Unicast
0
Small Office/Home Office Organizations (SOHO)
ISM
48. 802.11 uses CSMA/...
Open system
Watt and mW
WPA Enterprise -WEP -MAC filters
CA - Collision avoidance
49. In repeater mode - the repeater device connects to a normal '___ mode'
Passphrase
Repeater
Root mode
Authentication
50. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
1
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11n
Brute force - statistical and dictionary