SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WI-Fi Protected Setup was designed for which of the following wireless applications?
Small Office/Home Office Organizations (SOHO)
11
Monitor
CA - Collision avoidance
2. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
Small Office/Home Office Organizations (SOHO)
Encryption
7
3. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
CTS attacks - Deauth attack - Association flood - Jamming
HT Non member protection mode
3
IPSec
4. The open system authentication process uses how many frames?
802.11b HR/DSSS and 802.11 DSSS
Two
Encryption
Frequency
5. High throughput mode 2
Roaming
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
HT 20 MHz protection mode
Interference from a neighboring access point RF denial-of-service (Dos) attack
6. These are user configurable and present in only five 802.11 frame types...
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Diffraction
Transmitter and receiver
802.11g
7. an 802.11b 2.4GHz channel is how wide in MHz?
22MHz wide
3
Mismatched SSID
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
8. This sets the card to participate in an independent basic service set
Ad-Hoc
SSID and Channel
Carefully plan a strategy using WEP and VLANs
Small Office/Home Office Organizations (SOHO)
9. 802.11a uses which spread spectrum technology?
HT 20 MHz protection mode
Repeater
Active mode
OFDM
10. An Ack is expected for every____ frame transmitted
Trojan/Rogue APs
802.11g
Unicast
64-bit - 128-bit
11. Name 3 channels considered non overlapping in the 2.4GHZ band
Active mode
Security
1 -6 -11
802.11g
12. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
LTE
Passve Scanning
A VPN to the office network
13. the amplitude of an RF signal is
Captive portal
Open system
802.11i
Height of an RF signal
14. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Repeater
64-bit - 128-bit
1 - 5.5 and 11 Mbps
15. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
SSID (service set identifier)
X.509 certificates on the subscriber side only.
Wi-Fi Alliance
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
16. In bluetooth - one master may communicate with up to ___ slaves in a piconet
802.11b
Data rate increases
7
Semi directional and Highly directional
17. Bridge mode will not allow client associations and is ______ only
FHSS
802.11b HR/DSSS and 802.11 DSSS
AP to AP
7
18. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Mesh
Arp
802.11i
Other 802.11a devices
19. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
11
OFDM
LTE
20. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
ERP protection
Station (STA)
1
6 -12 - and 24 Mbps
21. What type of certification came from 802.11i
HT Non member protection mode
One or more
WPA2
802.11w
22. 3 types of antennas
Open system
Enter a username and password that will be central administered
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Management
23. The Layer 2 frame will be...
802.11b
WPA/WPA2
Dynamic Rate switching
Unencrypted
24. ____ is also known as the Protected management frame standard
IPSec
CCMP
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
802.11w
25. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Data rate increases
Client
Degradation
Managed
26. The process in which a wireless LAN clients connection moves from one access point to another is called ______
UNII
Roaming
Station (STA)
Management
27. Which security methods do 802.11g access points support?
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
WPA Enterprise -WEP -MAC filters
Refraction
Residential and Enterprise
28. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Deauth
FHSS
Captive portal
29. The association process happens after which phase?
802.11r
Authentication
Quality of Service
Wireless Game adapters and Media Bridges
30. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
2304 bytes
Wireless Game adapters and Media Bridges
PIN
Enter a username and password that will be central administered
31. A basic service set (BSS) consists of how many access points
802.11
1
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Reflection
32. Aireplay-ng -3
Arp
Active scanning
25 MHz
6 -12 - and 24 Mbps
33. Collisions are detected through the use of....
Acknowledgement frames
ERP protection
Greenfield mode
Authentication
34. As a device moves away from an access point - what is true regarding dynamic rate switching?
WEP
Passive scan
Other 802.11a devices
Data rate increases
35. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Security
802.11b HR/DSSS and 802.11 DSSS
Active mode
Access point
36. Bluetooth uses a radio technology called
1
FHSS
4 channels
64-bit - 128-bit
37. Beacons allow client devices to ____ for available LANS
Basic Service Set (BSS)
Passive scan
Open system and Shared key
Number of users and software applications in use
38. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
4 channels
Repeater
Height of an RF signal
39. In this mode a station can act as a relay or WLAN range extender
802.11b HR/DSSS and 802.11 DSSS
WPA 2.0 personal and WPS
Repeater
Residential and Enterprise
40. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
SOHO brands that support WPS
Unencrypted
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Mismatched SSID
41. Three types of passive WEP attacks
Dynamic Rate switching
Mesh network
Two
Brute force - statistical and dictionary
42. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Bridge mode
1 -6 -11
Deauth
Automatically monitor the network for attacks
43. What type of wireless network device is PIN-based security most commonly used with
Other 802.11a devices
SOHO brands that support WPS
1 - 5.5 and 11 Mbps
802.11g
44. What two devices use RF to communicate
Passive scan
Transmitter and receiver
Master
Indoor and outdoor
45. Name two relative measures of power
Active mode
TKIP - optional RC4
DB and dBi
Captive portal
46. Layer 2 Tunneling Protocol commonly uses which encryption method?
Automatically monitor the network for attacks
IPSec
CCMP
Interoperability testing organization
47. Both ___ and ___ are wireless LAN security methods that support shared key security.
1
WPA2 -WEP
Ad-Hoc
X.509 certificates on the subscriber side only.
48. Which items are unique to a service set identifier
Point-to-point link
32 character maximum and is case sensitive
Spoof an address
PIN
49. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
4 channels
Client
3
Transmitter and receiver
50. What kind of Algorithm does WPA2 use?
Security
Automatically monitor the network for attacks
AES = CCMP required
Repeater