SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What type of algorithm does WPA use
25 MHz
TKIP - optional RC4
AP to AP
Management - control - data
2. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Active mode
Independent
Plaintext
802.11a
3. The open system authentication process uses how many frames?
HT Non member protection mode
Two
Interoperability testing organization
Enter a username and password that will be central administered
4. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Unicast
11
Walled Garden.
802.11i
5. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
Arp replay
Spoof an address
ISM
OFDM
6. Beacons allow client devices to ____ for available LANS
Passive scan
Residential and Enterprise
Two
AP radio
7. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
TKIP - optional RC4
ERP-OFDM - DSSS
32 character maximum and is case sensitive
14
8. ____ is also known as the Protected management frame standard
Dictionary
802.11w
CA - Collision avoidance
Passive scan
9. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Management - control - data
Other 802.11a devices
Amplitude and phase
Active mode
10. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
802.11a
Bridge mode
DB and dBi
Monitor
11. A station can act as a routing node in a wireless mesh network
Mesh
802.11b
FHSS
Small Office/Home Office Organizations (SOHO)
12. What kind of Algorithm does WPA2 use?
3
Carefully plan a strategy using WEP and VLANs
AES = CCMP required
Acknowledgement frames
13. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Monitor
Bridge mode
Extended Service Set (ESS)
Interoperability testing organization
14. A ______________ does not always use an omnidirectional antenna
Security
Open system
Point-to-point link
DB and dBi
15. High throughput mode 2
Client
HT 20 MHz protection mode
2304 bytes
CCMP
16. 802.11b is capable of which data rates?
FHSS
ARP spoofing
802.11r
1 - 5.5 and 11 Mbps
17. What type of certification came from 802.11i
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
CCMP
WPA2
32 character maximum and is case sensitive
18. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
ERP protection
Management - control - data
Carefully plan a strategy using WEP and VLANs
Number of users and software applications in use
19. When RF passes or bends around an obstacle such as a building or column - the behavior is
Access point
Data rate increases
Number of users and software applications in use
Diffraction
20. What two devices use RF to communicate
Transmitter and receiver
Amplitude and phase
Secure Layer 3 transmissions over a public network infrastructure
HT Non member protection mode
21. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
ISM
Wavelength
WEP
Wireless gateways
22. Two authentication types defined in the 802.11 standard
Basic Service Set (BSS)
Open system and Shared key
Brute force - statistical and dictionary
Indoor and outdoor
23. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Indoor and outdoor
Greenfield mode
802.11n
One or more
24. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Active scanning
IPSec
CCMP
25. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Acknowledgement frames
7
40 bit
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
26. Two characteristics of signals are
Mismatched SSID
Unencrypted
DBi
Amplitude and phase
27. Typically a point-to-multipoint link consists of ____ connections
Workgroup Bridge mode.
Three
Managed
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
28. In repeater mode - the repeater device connects to a normal '___ mode'
Spoof an address
Deauth
FCC
Root mode
29. WiMAX 802.16 authentication is based on...
AP radio
X.509 certificates on the subscriber side only.
RC4
Captive portal
30. Wireless gateways come in two primary forms...
Authenticate - associate
Residential and Enterprise
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Fakeauth
31. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Diffraction
Management
Amplitude and phase
Ad-Hoc
32. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
Know the SSID and enter it manually
Mesh
11
33. The security amendment to the IEEE 802.11 standard requires ____
Authentication
Unicast
CCMP
802.11b
34. Layer 2 Tunneling Protocol commonly uses which encryption method?
802.11r
Dictionary
IPSec
Carefully plan a strategy using WEP and VLANs
35. Bluetooth uses a radio technology called
32 character maximum and is case sensitive
RC4
ARP spoofing
FHSS
36. Aireplay-ng -1
Open system and Shared key
Fakeauth
Managed
1 -6 -11
37. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Passve Scanning
Wavelength
IPSec
38. Aireplay-ng -3
Arp
Plaintext
Diffraction
Carefully plan a strategy using WEP and VLANs
39. What is regarded in 802.11e?
Addresses wireless Quality of Service
32
Open system
Restricts access to authorized users
40. Name two relative measures of power
DB and dBi
Small Office/Home Office Organizations (SOHO)
IPSec
64-bit - 128-bit
41. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
Passve Scanning
Dictionary
14
42. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Frequency
WPA2
Addresses wireless Quality of Service
SSID (service set identifier)
43. 802.11w can only be used in networks using_____
WEP
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Security
WPA/WPA2
44. This type of authentication is essentially 'Null authentication'
Open system
802.11a
Independent
SSID and Channel
45. Aireplay-ng -0
Point-to-point link
Deauth
802.11w
0
46. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Height of an RF signal
0
Workgroup Bridge mode.
Interference from a neighboring access point RF denial-of-service (Dos) attack
47. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Deauth
Carefully plan a strategy using WEP and VLANs
Client
PIN
48. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
SSID (service set identifier)
AES = CCMP required
Client
802.11
49. A newly configured wireless intrusion prevention system will___
HT Non member protection mode
Automatically monitor the network for attacks
Mesh
Frequency
50. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Management - control - data
40 bit
Open system
Repeater