SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The radio card can operate in one of up to six possible modes of operation...
HT fixed mode
802.11w
Access point
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
2. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
PIN
Wireless Game adapters and Media Bridges
Basic Service Set (BSS)
Enter a username and password that will be central administered
3. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Mesh network
Plaintext
Extended Service Set (ESS)
Management - control - data
4. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
RTS/CTS
Height of an RF signal
Extended Service Set (ESS)
5. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Dynamic Rate switching
Unicast
Root mode
6. An Ack is expected for every____ frame transmitted
Unicast
ISM
Service sets
Diffraction
7. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
CA - Collision avoidance
802.11a
A VPN to the office network
1 - 5.5 and 11 Mbps
8. What kind of Algorithm does WPA2 use?
OFDM
AES = CCMP required
802.11w
Basic Service Set (BSS)
9. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11r
Dynamic Rate switching
802.11i
4 channels
10. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Reflection
1 -6 -11
Repeater
One or more
11. Name two absolute measures of RF power
OFDM
7
Captive portal
Watt and mW
12. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
Wireless Game adapters and Media Bridges
Semi directional and Highly directional
Service sets
13. The Layer 2 frame will be...
Unencrypted
One or more
Bridge mode
Extended Service Set (ESS)
14. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Diffraction
OFDM
Acknowledgement frames
Other 802.11a devices
15. The open system authentication process uses how many frames?
CA - Collision avoidance
Two
WPA2
BSSID (Basic Service Set identifier)
16. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
802.11n
Passive scan
Passve Scanning
UNII
17. Maximum length of data (Frame body) is 2304 when ____ is not in use
Three
Encryption
AP radio
Captive portal
18. The association process happens after which phase?
Authentication
Refraction
HT fixed mode
Mesh network
19. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Frequency
Mismatched SSID
CTS attacks - Deauth attack - Association flood - Jamming
Diffraction
20. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
SSID (service set identifier)
ISM
802.11g
Enter a username and password that will be central administered
21. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
DBi
ISM
Spoof an address
22. These are user configurable and present in only five 802.11 frame types...
DBi
Residential and Enterprise
A VPN to the office network
Beacons - Probe request - Probe response - Association Request - Reassociation Request
23. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Workgroup Bridge mode.
32
CA - Collision avoidance
24. Aireplay-ng -0
Residential and Enterprise
Deauth
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
ERP protection
25. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
1 -6 -11
Deauth
Arp replay
RTS/CTS
26. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Trojan/Rogue APs
802.11b HR/DSSS and 802.11 DSSS
Data rate increases
2.4-2.5GHz
27. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Bridge mode
Passve Scanning
Deauth
4 channels
28. This type of authentication is essentially 'Null authentication'
Open system
Personal mode and Enterprise Mode
Degradation
Small Office/Home Office Organizations (SOHO)
29. High Throughput mode 1
HT Non member protection mode
Security
Interoperability testing organization
A VPN to the office network
30. Which items are unique to a service set identifier
32 character maximum and is case sensitive
64-bit - 128-bit
Two
One or more
31. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Authentication
Management
A VPN to the office network
Degradation
32. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11n
Fake auth
802.11b HR/DSSS and 802.11 DSSS
Fakeauth
33. What type of algorithm does WPA use
TKIP - optional RC4
LTE
RTS/CTS
Fake auth
34. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Wireless Game adapters and Media Bridges
Captive portal
SSID (service set identifier)
Data rate increases
35. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
1 -6 -11
Client
Workgroup Bridge mode.
Automatically monitor the network for attacks
36. What type of certification came from 802.11i
Encryption
Know the SSID and enter it manually
WPA2
Service sets
37. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Transmitter and receiver
Enter a username and password that will be central administered
Access point
ARP spoofing
38. A brute force attack is limited to breaking___ WEP keys
Two
Station (STA)
40 bit
Wi-Fi Alliance
39. Two authentication types defined in the 802.11 standard
Roaming
Reflection
6 -12 - and 24 Mbps
Open system and Shared key
40. Which function does RBAC provide?
Access point
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Restricts access to authorized users
SOHO brands that support WPS
41. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
AP to AP
ERP protection
Dynamic Rate switching
42. The security amendment to the IEEE 802.11 standard requires ____
HT 20 MHz protection mode
CCMP
Active mode
Trojan/Rogue APs - Arp spoofing - DNS spoofing
43. Bluetooth uses a radio technology called
BSSID (Basic Service Set identifier)
Open system and Shared key
FHSS
14
44. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
RC4
Data rate increases
802.11a
Monitor
45. What two devices use RF to communicate
802.11n
Transmitter and receiver
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Residential and Enterprise
46. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Roaming
BSSID (Basic Service Set identifier)
WPA 2.0 personal and WPS
Independent
47. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Amplitude and phase
Dynamic Rate switching
Access point
One or more
48. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
CTS attacks - Deauth attack - Association flood - Jamming
Spoof an address
RTS/CTS
49. A ______________ does not always use an omnidirectional antenna
CTS attacks - Deauth attack - Association flood - Jamming
802.11a
Point-to-point link
CA - Collision avoidance
50. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Access point
Refraction
14
Authentication