SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -3
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
6 -12 - and 24 Mbps
Obstacles
Arp
2. A service set identifier (SSID) has a maximum limit of how many characters?
Wireless gateways
BSSID (Basic Service Set identifier)
32
Other 802.11a devices
3. 3 types of frames
Restricts access to authorized users
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Management - control - data
ISM
4. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Antenna diversity
Independent
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
HT fixed mode
5. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. The radio card can operate in one of up to six possible modes of operation...
One or more
Restricts access to authorized users
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
UNII
7. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
FHSS
Know the SSID and enter it manually
Arp replay
Wireless gateways
8. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Open system
AP radio
Station (STA)
Interference from a neighboring access point RF denial-of-service (Dos) attack
9. When RF passes or bends around an obstacle such as a building or column - the behavior is
Passve Scanning
802.11
Diffraction
HT Non member protection mode
10. Both ___ and ___ are wireless LAN security methods that support shared key security.
WPA2 -WEP
HT fixed mode
Unencrypted
Master
11. 802.11a uses which spread spectrum technology?
OFDM
Arp
WPA2
AP radio
12. WPA was developed as an interim solution for which amendment to the 802.11 standards?
ERP-OFDM - DSSS
802.11i
Single radio AP's
Two
13. In repeater mode - the repeater device connects to a normal '___ mode'
CCMP
Root mode
Authenticate - associate
Wireless gateways
14. Point to Point links typically use which antenna types?
PIN
Semi directional and Highly directional
WPA Enterprise -WEP -MAC filters
BSSID (Basic Service Set identifier)
15. Two characteristics of signals are
Transmitter and receiver
Brute force - statistical and dictionary
Interoperability testing organization
Amplitude and phase
16. As a device moves away from an access point - what is true regarding dynamic rate switching?
Roaming
Degradation
Wi-Fi Alliance
Data rate increases
17. What is the gain of an antenna measured in
AES = CCMP required
SSID (service set identifier)
DBi
1
18. 802.11b is capable of which data rates?
Managed
WEP
1 - 5.5 and 11 Mbps
Acknowledgement frames
19. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
Root mode
Repeater
802.11n
20. Maximum length of data (Frame body) is 2304 when ____ is not in use
Repeater
Encryption
4 channels
AES = CCMP required
21. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Degradation
Passive scan
Active mode
Wavelength
22. This type of authentication is essentially 'Null authentication'
Fake auth
Open system
Management - control - data
Root mode
23. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Other 802.11a devices
Secure Layer 3 transmissions over a public network infrastructure
Enter a username and password that will be central administered
Personal mode and Enterprise Mode
24. The 802.11i amendment to the standard addresses which of the following technologies?
Unicast
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Security
RTS/CTS
25. In bluetooth - one master may communicate with up to ___ slaves in a piconet
7
Dual radio APs
Three
1 - 5.5 and 11 Mbps
26. A basic service set identifier (BSSID) is the MAC address of the ____
Client
OFDM
Management
AP radio
27. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11b HR/DSSS and 802.11 DSSS
802.11
22MHz wide
802.11n
28. What algorithm does WEP use
Root mode
SSID and Channel
RC4
802.11b
29. Which security feature provides the strongest security for a home-based wireless network?
X.509 certificates on the subscriber side only.
11
Root mode
Passphrase
30. ____ is also known as the Protected management frame standard
Passphrase
802.11w
Management
Semi directional and Highly directional
31. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
WPA2 -WEP
Unencrypted
Fake auth
32
32. The Access point can operate in a variety of modes...
14
DBi
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
ERP-OFDM - DSSS
33. The open system authentication process uses how many frames?
Restricts access to authorized users
Fakeauth
Two
Brute force - statistical and dictionary
34. High throughput mode 2
HT 20 MHz protection mode
Wireless Game adapters and Media Bridges
802.11r
X.509 certificates on the subscriber side only.
35. Name two relative measures of power
22MHz wide
Personal mode and Enterprise Mode
DB and dBi
ERP protection
36. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
40 bit
Deauth
802.11b HR/DSSS and 802.11 DSSS
Dynamic Rate switching
37. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Root mode
Client
Wi-Fi Alliance
Extended Service Set (ESS)
38. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Wireless gateways
Service sets
Captive portal
ERP protection
39. Typically a point-to-multipoint link consists of ____ connections
Three
SOHO brands that support WPS
Dual radio APs
CTS attacks - Deauth attack - Association flood - Jamming
40. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Active scanning
ERP-OFDM - DSSS
Extended Service Set (ESS)
41. Three types of passive WEP attacks
Brute force - statistical and dictionary
HT Non member protection mode
Passphrase
BSSID (Basic Service Set identifier)
42. An Ack is expected for every____ frame transmitted
ERP protection
WPA/WPA2
IPSec
Unicast
43. In this mode - the card acts as a normal access point
Master
WPA2
802.11n
Degradation
44. What kind of Algorithm does WPA2 use?
Point-to-point link
SSID and Channel
Client
AES = CCMP required
45. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
Amplitude and phase
HT 20 MHz protection mode
Greenfield mode
46. The association process happens after which phase?
Authentication
6 -12 - and 24 Mbps
Wireless Game adapters and Media Bridges
Basic Service Set (BSS)
47. In this mode a station can act as a relay or WLAN range extender
3
Dynamic Rate switching
Access point
Repeater
48. A basic service set (BSS) consists of how many access points
HT Non member protection mode
Refraction
32 character maximum and is case sensitive
1
49. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Deauth
Frequency
Restricts access to authorized users
Transmitter and receiver
50. The security amendment to the IEEE 802.11 standard requires ____
Addresses wireless Quality of Service
Three
40 bit
CCMP