SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
LTE
Residential and Enterprise
Management - control - data
Mesh
2. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
RTS/CTS
Repeater
MAC
WPA2
3. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
Small Office/Home Office Organizations (SOHO)
Two
WPA2 -WEP
Fake auth
4. The 802.11i amendment to the standard addresses which of the following technologies?
Security
Single radio AP's
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
DBi
5. A basic service set (BSS) consists of how many access points
1
Wi-Fi Alliance
Passve Scanning
Wavelength
6. A newly configured wireless intrusion prevention system will___
Service sets
Automatically monitor the network for attacks
Open system
DB and dBi
7. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
X.509 certificates on the subscriber side only.
PIN
Unicast
802.11g
8. When a wireless LAN device listens for beacon frames - it is participating in which phase?
BSSID (Basic Service Set identifier)
CCMP
Security
Passve Scanning
9. The Access point can operate in a variety of modes...
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
64-bit - 128-bit
FCC
Ad-Hoc
10. 4 types of Denial of Service attacks
Small Office/Home Office Organizations (SOHO)
AP to AP
CTS attacks - Deauth attack - Association flood - Jamming
Acknowledgement frames
11. Name two absolute measures of RF power
802.11b HR/DSSS and 802.11 DSSS
Residential and Enterprise
ERP protection
Watt and mW
12. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
LTE
Automatically monitor the network for attacks
ISM
X.509 certificates on the subscriber side only.
13. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Quality of Service
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Active mode
14. Probe requests are used by clients as part of the ____ process
Active scanning
Open system
4 channels
CCMP
15. What type of wireless network device is PIN-based security most commonly used with
Authenticate - associate
SOHO brands that support WPS
Roaming
Small Office/Home Office Organizations (SOHO)
16. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
Authentication
Station (STA)
Obstacles
17. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Dual radio APs
Acknowledgement frames
Carefully plan a strategy using WEP and VLANs
Small Office/Home Office Organizations (SOHO)
18. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Ad-Hoc
Authenticate - associate
802.11b
Dictionary
19. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
Dynamic Rate switching
ARP spoofing
0
Secure Layer 3 transmissions over a public network infrastructure
20. Which function does RBAC provide?
ERP protection
Bridge mode
Restricts access to authorized users
Passphrase
21. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Access point
One or more
CCMP
ERP protection
22. As a device moves away from an access point - what is true regarding dynamic rate switching?
Access point
SOHO brands that support WPS
Reflection
Data rate increases
23. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Acknowledgement frames
Brute force - statistical and dictionary
Enter a username and password that will be central administered
25 MHz
24. The security amendment to the IEEE 802.11 standard requires ____
CCMP
1
25 MHz
Three
25. What item has an effect on RF line of site?
Management
802.11b
64-bit - 128-bit
Obstacles
26. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Watt and mW
802.11w
Diffraction
Wireless gateways
27. In this mode a station can act as a relay or WLAN range extender
Management - control - data
1 - 5.5 and 11 Mbps
Repeater
Interoperability testing organization
28. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Addresses wireless Quality of Service
Semi directional and Highly directional
29. This is a topology in which two or more APs are connected by a common distribution system.
LTE
WPA2 -WEP
Trojan/Rogue APs
Extended Service Set (ESS)
30. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
4 channels
Mesh
Active mode
MAC
31. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
HT 20 MHz protection mode
Automatically monitor the network for attacks
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Refraction
32. A station can act as a routing node in a wireless mesh network
Master
Mesh
DBi
SSID (service set identifier)
33. A brute force attack is limited to breaking___ WEP keys
64-bit - 128-bit
Unicast
WPA 2.0 personal and WPS
40 bit
34. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
FCC
Managed
UNII
802.11a
35. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
HT 20 MHz protection mode
4 channels
Mismatched SSID
ARP spoofing
36. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
AES = CCMP required
Frequency
802.11b HR/DSSS and 802.11 DSSS
WPA 2.0 personal and WPS
37. What best describes the Wi-Fi alliance?
OFDM
Passphrase
Interoperability testing organization
Trojan/Rogue APs
38. Two authentication types defined in the 802.11 standard
Service sets
Open system and Shared key
Frequency
Watt and mW
39. The open system authentication process uses how many frames?
Two
Degradation
Mismatched SSID
Bridge mode
40. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Bridge mode
Enter a username and password that will be central administered
Access point
Dynamic Rate switching
41. Aireplay-ng -0
Deauth
Walled Garden.
25 MHz
22MHz wide
42. Which security methods do 802.11g access points support?
1
DBi
ERP-OFDM - DSSS
WPA Enterprise -WEP -MAC filters
43. Aireplay-ng -1
Small Office/Home Office Organizations (SOHO)
Fakeauth
802.11r
AP to AP
44. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Authenticate - associate
Captive portal
RC4
Repeater
45. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Addresses wireless Quality of Service
Mesh
Other 802.11a devices
WPA2 -WEP
46. High Throughput mode 0
HT Non member protection mode
Acknowledgement frames
FHSS
Greenfield mode
47. The 802.11g standard uses which two speed spectrum technologies.
802.11w
64-bit - 128-bit
Secure Layer 3 transmissions over a public network infrastructure
ERP-OFDM - DSSS
48. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
HT fixed mode
11
14
Repeater
49. 802.11b is capable of which data rates?
1 - 5.5 and 11 Mbps
Access point
Access point
Spoof an address
50. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
0
Other 802.11a devices
ARP spoofing