SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The open system authentication process uses how many frames?
802.11w
Data rate increases
Addresses wireless Quality of Service
Two
2. Aireplay-ng -0
Authentication
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
802.11b
Deauth
3. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
X.509 certificates on the subscriber side only.
Passphrase
Repeater
4. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
TKIP - optional RC4
6 -12 - and 24 Mbps
Wireless gateways
5. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
Dual radio APs
802.11a
Workgroup Bridge mode.
6. High Throughput mode 1
Carefully plan a strategy using WEP and VLANs
DBi
Wavelength
HT Non member protection mode
7. 4 types of Denial of Service attacks
Acknowledgement frames
4 channels
CTS attacks - Deauth attack - Association flood - Jamming
Captive portal
8. Which items are unique to a service set identifier
Two
Secure Layer 3 transmissions over a public network infrastructure
Authentication
32 character maximum and is case sensitive
9. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
14
BSSID (Basic Service Set identifier)
802.11i
Carefully plan a strategy using WEP and VLANs
10. What type of certification came from 802.11i
2304 bytes
Roaming
WPA2
Indoor and outdoor
11. The Access point can operate in a variety of modes...
40 bit
Passve Scanning
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Root mode
12. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Know the SSID and enter it manually
ERP protection
Data rate increases
MAC
13. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
14. Which process is a VPN solution intended to provide for users connection to a network
HT fixed mode
Dual radio APs
Deauth
Secure Layer 3 transmissions over a public network infrastructure
15. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
4 channels
PIN
2304 bytes
Extended Service Set (ESS)
16. Collisions are detected through the use of....
X.509 certificates on the subscriber side only.
Acknowledgement frames
Carefully plan a strategy using WEP and VLANs
Repeater
17. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
WPA 2.0 personal and WPS
Passive scan
DBi
18. A service set identifier (SSID) has a maximum limit of how many characters?
Automatically monitor the network for attacks
Mesh network
32
Trojan/Rogue APs - Arp spoofing - DNS spoofing
19. WI-Fi Protected Setup was designed for which of the following wireless applications?
Small Office/Home Office Organizations (SOHO)
802.11a
Repeater
Mesh
20. The length of a WEP key is typically ___ or ___
HT 20 MHz protection mode
Dynamic Rate switching
64-bit - 128-bit
Passve Scanning
21. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Master
Access point
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Reflection
22. What type of algorithm does WPA use
Greenfield mode
802.11w
Small Office/Home Office Organizations (SOHO)
TKIP - optional RC4
23. In repeater mode - the repeater device connects to a normal '___ mode'
PIN
Enter a username and password that will be central administered
Root mode
ISM
24. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Management - control - data
BSSID (Basic Service Set identifier)
Roaming
25. Management frames are sent in....
Plaintext
14
Deauth
Greenfield mode
26. This is the default mode that sets the card as a client that could then connect to an AP
Client
Single radio AP's
802.11b
Managed
27. The Layer 2 frame will be...
Mesh network
Three
Unencrypted
Authentication
28. 802.11w can only be used in networks using_____
Trojan/Rogue APs - Arp spoofing - DNS spoofing
TKIP - optional RC4
Captive portal
WPA/WPA2
29. A newly configured wireless intrusion prevention system will___
Reflection
Wireless Game adapters and Media Bridges
Automatically monitor the network for attacks
Mesh
30. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
WPA2
Reflection
32 character maximum and is case sensitive
31. 802.11b is capable of which data rates?
Frequency
HT Non member protection mode
1 - 5.5 and 11 Mbps
1 -6 -11
32. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Frequency
Restricts access to authorized users
Dual radio APs
Authenticate - associate
33. This is a topology in which two or more APs are connected by a common distribution system.
FHSS
Extended Service Set (ESS)
Plaintext
Mismatched SSID
34. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
Refraction
Trojan/Rogue APs
HT 20 MHz protection mode
35. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Bridge mode
RC4
Interference from a neighboring access point RF denial-of-service (Dos) attack
Mesh network
36. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
DB and dBi
Wireless gateways
Three
37. Point to Point links typically use which antenna types?
Semi directional and Highly directional
802.11
Other 802.11a devices
Roaming
38. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Degradation
WEP
11
Interference from a neighboring access point RF denial-of-service (Dos) attack
39. Typically a point-to-multipoint link consists of ____ connections
Three
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
11
Ad-Hoc
40. In this mode - the card acts as a normal access point
Master
MAC
Watt and mW
PIN
41. When RF passes or bends around an obstacle such as a building or column - the behavior is
Spoof an address
Diffraction
Unicast
Dynamic Rate switching
42. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
7
3
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Enter a username and password that will be central administered
43. High Throughput mode 0
Antenna diversity
Unencrypted
Greenfield mode
Authentication
44. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
802.11g
Bridge mode
Wireless gateways
One or more
45. What algorithm does WEP use
RC4
Basic Service Set (BSS)
Fakeauth
FHSS
46. Three types of MITM attacks
Authenticate - associate
Trojan/Rogue APs - Arp spoofing - DNS spoofing
AP to AP
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
47. Wireless gateways come in two primary forms...
HT fixed mode
DB and dBi
Addresses wireless Quality of Service
Residential and Enterprise
48. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Addresses wireless Quality of Service
3
802.11g
Active mode
49. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
HT Non member protection mode
Fake auth
Authentication
Frequency
50. Two characteristics of signals are
2.4-2.5GHz
SSID (service set identifier)
Three
Amplitude and phase
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests