SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Authenticate - associate
Two
Dual radio APs
Mesh
2. Which function does RBAC provide?
PIN
OFDM
Restricts access to authorized users
Authenticate - associate
3. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
1 -6 -11
DB and dBi
802.11i
4. What organization is responsible for unlicensed frequency band regulations in the United States?
Three
BSSID (Basic Service Set identifier)
802.11a
FCC
5. What type of wireless network device is PIN-based security most commonly used with
Indoor and outdoor
Dynamic Rate switching
Amplitude and phase
SOHO brands that support WPS
6. Name two absolute measures of RF power
Watt and mW
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Trojan/Rogue APs
Unicast
7. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Spoof an address
802.11b HR/DSSS and 802.11 DSSS
Captive portal
Passive scan
8. 802.11 frames have a maximum 'upper-layer' payload of...
CCMP
Point-to-point link
2304 bytes
RC4
9. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
IPSec
Client
X.509 certificates on the subscriber side only.
25 MHz
10. What kind of Algorithm does WPA2 use?
AES = CCMP required
Encryption
Active scanning
ERP protection
11. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
11
802.11
Managed
12. WI-Fi Protected Setup was designed for which of the following wireless applications?
Small Office/Home Office Organizations (SOHO)
Amplitude and phase
Master
UNII
13. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
Ad-Hoc
Authenticate - associate
SSID and Channel
14. What best describes the Wi-Fi alliance?
Interoperability testing organization
Degradation
Workgroup Bridge mode.
WPA Enterprise -WEP -MAC filters
15. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Wireless gateways
SSID (service set identifier)
Access point
TKIP - optional RC4
16. High Throughput mode 1
HT Non member protection mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Client
Repeater
17. Bridge mode will not allow client associations and is ______ only
AP to AP
FCC
1 -6 -11
Basic Service Set (BSS)
18. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
ERP protection
Passphrase
CA - Collision avoidance
32
19. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Secure Layer 3 transmissions over a public network infrastructure
A VPN to the office network
Unicast
Fakeauth
20. A basic service set identifier (BSSID) is the MAC address of the ____
IPSec
802.11w
Frequency
AP radio
21. Aireplay-ng -3
Arp
FCC
Secure Layer 3 transmissions over a public network infrastructure
Authenticate - associate
22. 802.11w can only be used in networks using_____
Roaming
7
WPA/WPA2
Two
23. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Fake auth
DB and dBi
MAC
Single radio AP's
24. WiMAX 802.16 authentication is based on...
Number of users and software applications in use
X.509 certificates on the subscriber side only.
Spoof an address
Master
25. Maximum length of data (Frame body) is 2304 when ____ is not in use
Residential and Enterprise
Encryption
AES = CCMP required
802.11g
26. Which security feature provides the strongest security for a home-based wireless network?
Reflection
Passphrase
4 channels
Security
27. Beacons allow client devices to ____ for available LANS
Passive scan
Enter a username and password that will be central administered
Personal mode and Enterprise Mode
AES = CCMP required
28. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
X.509 certificates on the subscriber side only.
Personal mode and Enterprise Mode
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Extended Service Set (ESS)
29. An independent basic service set (IBSS) consists of how many access points?
BSSID (Basic Service Set identifier)
Three
0
CCMP
30. ____ is also known as the Protected management frame standard
ISM
MAC
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11w
31. 802.11 uses CSMA/...
Open system
Wavelength
CA - Collision avoidance
One or more
32. Which if the following organizations is responsible for standards compliance?
802.11g
Root mode
Wi-Fi Alliance
Client
33. High throughput mode 3
Single radio AP's
2304 bytes
HT fixed mode
Other 802.11a devices
34. This is the default mode that sets the card as a client that could then connect to an AP
Passive scan
Plaintext
Managed
WPA2 -WEP
35. According to the 802.11a amendment - which data rates are mandatory?
Passphrase
6 -12 - and 24 Mbps
3
Managed
36. A station can act as a routing node in a wireless mesh network
Mesh
Spoof an address
Open system
Active scanning
37. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
Know the SSID and enter it manually
Height of an RF signal
One or more
38. The length of a WEP key is typically ___ or ___
802.11i
64-bit - 128-bit
Obstacles
802.11b
39. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Single radio AP's
11
Monitor
1
40. In order to set up an ad hoc network a user must know which two parameters?
1
Frequency
Residential and Enterprise
SSID and Channel
41. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
Indoor and outdoor
Encryption
Wavelength
42. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Enter a username and password that will be central administered
Acknowledgement frames
802.11b HR/DSSS and 802.11 DSSS
LTE
43. Typically a point-to-multipoint link consists of ____ connections
Three
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
IPSec
Mesh network
44. A brute force attack is limited to breaking___ WEP keys
4 channels
CCMP
Client
40 bit
45. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
11
HT Non member protection mode
A VPN to the office network
Antenna diversity
46. A weakness with MAC filtering is that it allows an intruder to ____
Semi directional and Highly directional
MAC
802.11n
Spoof an address
47. What type of algorithm does WPA use
Refraction
802.11g
TKIP - optional RC4
Restricts access to authorized users
48. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
Management - control - data
Personal mode and Enterprise Mode
CCMP
49. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Brute force - statistical and dictionary
ISM
AP radio
Indoor and outdoor
50. This type of authentication is essentially 'Null authentication'
Open system
Fake auth
4 channels
Automatically monitor the network for attacks