SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Maximum length of data (Frame body) is 2304 when ____ is not in use
Quality of Service
Encryption
WPA 2.0 personal and WPS
RTS/CTS
2. 3 types of antennas
Data rate increases
DB and dBi
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Extended Service Set (ESS)
3. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Station (STA)
Passve Scanning
Basic Service Set (BSS)
Arp
4. A newly configured wireless intrusion prevention system will___
Dictionary
Automatically monitor the network for attacks
Fake auth
Small Office/Home Office Organizations (SOHO)
5. A basic service set (BSS) consists of how many access points
Quality of Service
Dynamic Rate switching
1
MAC
6. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
AP to AP
802.11b
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Passive scan
7. Which items are unique to a service set identifier
802.11n
SSID and Channel
WPA2
32 character maximum and is case sensitive
8. Both ___ and ___ are wireless LAN security methods that support shared key security.
Indoor and outdoor
WPA2 -WEP
Single radio AP's
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
9. Point to Point links typically use which antenna types?
DB and dBi
RTS/CTS
Semi directional and Highly directional
2.4-2.5GHz
10. According to the 802.11a amendment - which data rates are mandatory?
Walled Garden.
4 channels
Brute force - statistical and dictionary
6 -12 - and 24 Mbps
11. Typically a point-to-multipoint link consists of ____ connections
Access point
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Quality of Service
Three
12. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Indoor and outdoor
Semi directional and Highly directional
4 channels
802.11i
13. ___ are used to describe the basic components and topology of a WLAN
Carefully plan a strategy using WEP and VLANs
TKIP - optional RC4
SSID and Channel
Service sets
14. Management frames are sent in....
Plaintext
Authentication
Unencrypted
IPSec
15. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Root mode
Fakeauth
802.11r
16. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Monitor
FCC
Fake auth
6 -12 - and 24 Mbps
17. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
X.509 certificates on the subscriber side only.
Bridge mode
ISM
Roaming
18. A brute force attack is limited to breaking___ WEP keys
40 bit
3
HT fixed mode
11
19. What item has an effect on RF line of site?
Watt and mW
WPA Enterprise -WEP -MAC filters
Obstacles
Wavelength
20. In bluetooth - one master may communicate with up to ___ slaves in a piconet
802.11
7
Residential and Enterprise
Repeater
21. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Mismatched SSID
DBi
RTS/CTS
Monitor
22. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
ERP protection
X.509 certificates on the subscriber side only.
HT 20 MHz protection mode
23. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
Security
HT fixed mode
Authentication
24. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
1 - 5.5 and 11 Mbps
3
Interference from a neighboring access point RF denial-of-service (Dos) attack
Plaintext
25. What type of algorithm does WPA use
Ad-Hoc
TKIP - optional RC4
Extended Service Set (ESS)
Independent
26. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
PIN
Repeater
Dual radio APs
802.11a
27. In order to set up an ad hoc network a user must know which two parameters?
22MHz wide
Greenfield mode
SSID and Channel
7
28. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Mismatched SSID
Carefully plan a strategy using WEP and VLANs
Three
Frequency
29. What type of wireless network device is PIN-based security most commonly used with
802.11n
Know the SSID and enter it manually
Brute force - statistical and dictionary
SOHO brands that support WPS
30. Which function does RBAC provide?
Mesh network
Automatically monitor the network for attacks
Restricts access to authorized users
Data rate increases
31. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
Semi directional and Highly directional
IPSec
25 MHz
32. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Carefully plan a strategy using WEP and VLANs
WPA2
DBi
1 -6 -11
33. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Dynamic Rate switching
LTE
ERP protection
802.11r
34. A ______________ does not always use an omnidirectional antenna
RTS/CTS
1 -6 -11
Point-to-point link
Addresses wireless Quality of Service
35. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Roaming
Greenfield mode
Captive portal
Extended Service Set (ESS)
36. The open system authentication process uses how many frames?
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Passive scan
AP radio
Two
37. WiMAX 802.16 authentication is based on...
X.509 certificates on the subscriber side only.
Antenna diversity
Know the SSID and enter it manually
7
38. The capacity of an access point is dependent upon which factors?
HT fixed mode
X.509 certificates on the subscriber side only.
FHSS
Number of users and software applications in use
39. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
Access point
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Walled Garden.
40. The radio card can operate in one of up to six possible modes of operation...
40 bit
802.11w
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
41. The security amendment to the IEEE 802.11 standard requires ____
MAC
Number of users and software applications in use
Obstacles
CCMP
42. 802.11b is capable of which data rates?
Access point
Spoof an address
Managed
1 - 5.5 and 11 Mbps
43. This is typically the 48-bit MAC address of the access point's radio card.
WPA 2.0 personal and WPS
BSSID (Basic Service Set identifier)
DB and dBi
Workgroup Bridge mode.
44. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Automatically monitor the network for attacks
Quality of Service
Access point
ARP spoofing
45. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
Security
Personal mode and Enterprise Mode
SSID (service set identifier)
46. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Indoor and outdoor
SSID (service set identifier)
Refraction
ARP spoofing
47. Aireplay-ng -1
Fakeauth
4 channels
Other 802.11a devices
Security
48. High throughput mode 2
HT 20 MHz protection mode
DB and dBi
3
Dynamic Rate switching
49. The Layer 2 frame will be...
Unencrypted
SSID and Channel
802.11b HR/DSSS and 802.11 DSSS
Spoof an address
50. Aireplay-ng -3
Arp
Fake auth
7
Semi directional and Highly directional
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests