Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -0






2. This is a topology in which two or more APs are connected by a common distribution system.






3. 4 types of Denial of Service attacks






4. What algorithm does WEP use






5. Give two examples of WGB devices.






6. What two devices use RF to communicate






7. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






8. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






9. Which security methods do 802.11g access points support?






10. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






11. This is typically the 48-bit MAC address of the access point's radio card.






12. the amplitude of an RF signal is






13. In this mode a station can act as a relay or WLAN range extender






14. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






15. What best describes the Wi-Fi alliance?






16. Which process is a VPN solution intended to provide for users connection to a network






17. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






18. A pre-shared key mode may be vulnerable to a ____ attack






19. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup






20. Two authentication types defined in the 802.11 standard






21. ___ are used to describe the basic components and topology of a WLAN






22. According to the 802.11a amendment - which data rates are mandatory?






23. The association process happens after which phase?






24. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






25. 802.11 uses CSMA/...






26. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






27. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






28. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






29. Both ___ and ___ are wireless LAN security methods that support shared key security.






30. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






31. Name 3 channels considered non overlapping in the 2.4GHZ band






32. Management frames are sent in....






33. In repeater mode - the repeater device connects to a normal '___ mode'






34. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






35. When a wireless LAN device listens for beacon frames - it is participating in which phase?






36. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?






37. Typically a point-to-multipoint link consists of ____ connections






38. What kind of Algorithm does WPA2 use?






39. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I






40. Maximum length of data (Frame body) is 2304 when ____ is not in use






41. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






42. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






43. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?






44. A newly configured wireless intrusion prevention system will___






45. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






46. An independent basic service set (IBSS) consists of how many access points?






47. 802.11a uses which spread spectrum technology?






48. Two characteristics of signals are






49. This is the default mode that sets the card as a client that could then connect to an AP






50. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183