Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Collisions are detected through the use of....






2. The capacity of an access point is dependent upon which factors?






3. WPA was developed as an interim solution for which amendment to the 802.11 standards?






4. Aireplay-ng -0






5. Layer 2 Tunneling Protocol commonly uses which encryption method?






6. Aireplay-ng -3






7. In this mode - the card acts as a normal access point






8. 802.11b is capable of which data rates?






9. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






10. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo






11. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM






12. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






13. Three types of MITM attacks






14. What is regarded in 802.11e?






15. The length of a WEP key is typically ___ or ___






16. When a wireless LAN device listens for beacon frames - it is participating in which phase?






17. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






18. The 802.11i amendment to the standard addresses which of the following technologies?






19. This type of authentication is essentially 'Null authentication'






20. A pre-shared key mode may be vulnerable to a ____ attack






21. What type of algorithm does WPA use






22. Probe requests are used by clients as part of the ____ process






23. A weakness with MAC filtering is that it allows an intruder to ____






24. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






25. Typically a point-to-multipoint link consists of ____ connections






26. Management frames are sent in....






27. Point to Point links typically use which antenna types?






28. In order for a wireless client to become completely part of the basic service set it must first ___ then ___






29. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






30. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?






31. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






32. High Throughput mode 0






33. The process in which a wireless LAN clients connection moves from one access point to another is called ______






34. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






35. This is a topology in which two or more APs are connected by a common distribution system.






36. This is the default mode that sets the card as a client that could then connect to an AP






37. Two characteristics of signals are






38. High throughput mode 2






39. What item has an effect on RF line of site?






40. 802.11 uses CSMA/...






41. What two devices use RF to communicate






42. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






43. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






44. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






45. As a device moves away from an access point - what is true regarding dynamic rate switching?






46. 802.11a uses which spread spectrum technology?






47. A ______________ does not always use an omnidirectional antenna






48. In repeater mode - the repeater device connects to a normal '___ mode'






49. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






50. The 802.11g standard uses which two speed spectrum technologies.







Sorry!:) No result found.

Can you answer 50 questions in 15 minutes?


Let me suggest you:



Major Subjects



Tests & Exams


AP
CLEP
DSST
GRE
SAT
GMAT

Most popular tests