Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The Access point can operate in a variety of modes...






2. The capacity of an access point is dependent upon which factors?






3. What best describes the Wi-Fi alliance?






4. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.






5. Two characteristics of signals are






6. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.






7. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






8. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO






9. Bluetooth uses a radio technology called






10. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






11. What two devices use RF to communicate






12. A weakness with MAC filtering is that it allows an intruder to ____






13. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






14. Which function does RBAC provide?






15. A basic service set (BSS) consists of how many access points






16. 3 types of frames






17. A station can act as a routing node in a wireless mesh network






18. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o






19. 3 types of antennas






20. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?






21. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?






22. In repeater mode - the repeater device connects to a normal '___ mode'






23. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies






24. What type of certification came from 802.11i






25. 802.11w can only be used in networks using_____






26. High throughput mode 2






27. 4 types of Denial of Service attacks






28. 802.11 frames have a maximum 'upper-layer' payload of...






29. What algorithm does WEP use






30. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


31. The length of a WEP key is typically ___ or ___






32. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?






33. Which security methods do 802.11g access points support?






34. Three types of MITM attacks






35. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






36. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






37. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway






38. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






39. ___ is the topology in which no AP participates - client devices communicate directly to eachother.






40. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






41. An independent basic service set (IBSS) consists of how many access points?






42. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






43. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






44. Beacons allow client devices to ____ for available LANS






45. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






46. This is the default mode that sets the card as a client that could then connect to an AP






47. Two authentication types defined in the 802.11 standard






48. An Ack is expected for every____ frame transmitted






49. In this mode a station can act as a relay or WLAN range extender






50. When an RF signal bounces off a smooth non absorptive surface - the behavior is