SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
DBi
Residential and Enterprise
Open system
2. 802.11 uses CSMA/...
CA - Collision avoidance
SSID and Channel
Dynamic Rate switching
IPSec
3. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
40 bit
ARP spoofing
Arp replay
Mesh network
4. According to the 802.11a amendment - which data rates are mandatory?
Number of users and software applications in use
Unencrypted
6 -12 - and 24 Mbps
Addresses wireless Quality of Service
5. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
2304 bytes
Roaming
32 character maximum and is case sensitive
6. This type of authentication is essentially 'Null authentication'
Open system
Frequency
4 channels
2304 bytes
7. Which if the following organizations is responsible for standards compliance?
Deauth
Know the SSID and enter it manually
Number of users and software applications in use
Wi-Fi Alliance
8. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Wireless Game adapters and Media Bridges
CA - Collision avoidance
Degradation
Managed
9. What best describes the Wi-Fi alliance?
Acknowledgement frames
Interoperability testing organization
4 channels
Access point
10. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Watt and mW
Trojan/Rogue APs
WPA 2.0 personal and WPS
Managed
11. What type of certification came from 802.11i
Managed
WPA2
Interoperability testing organization
Client
12. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
OFDM
MAC
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
A VPN to the office network
13. the amplitude of an RF signal is
Semi directional and Highly directional
Height of an RF signal
Other 802.11a devices
Quality of Service
14. In bluetooth - one master may communicate with up to ___ slaves in a piconet
0
Interference from a neighboring access point RF denial-of-service (Dos) attack
7
WPA2
15. What kind of Algorithm does WPA2 use?
AES = CCMP required
Know the SSID and enter it manually
Personal mode and Enterprise Mode
Small Office/Home Office Organizations (SOHO)
16. In order to set up an ad hoc network a user must know which two parameters?
Diffraction
SSID and Channel
14
Spoof an address
17. A basic service set (BSS) consists of how many access points
Fakeauth
4 channels
One or more
1
18. What type of algorithm does WPA use
22MHz wide
TKIP - optional RC4
ARP spoofing
32 character maximum and is case sensitive
19. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
OFDM
Personal mode and Enterprise Mode
Amplitude and phase
Greenfield mode
20. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
Repeater
Residential and Enterprise
AES = CCMP required
21. an 802.11b 2.4GHz channel is how wide in MHz?
22MHz wide
Plaintext
11
OFDM
22. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
32 character maximum and is case sensitive
Arp replay
Unicast
23. 3 types of antennas
Know the SSID and enter it manually
802.11b HR/DSSS and 802.11 DSSS
Station (STA)
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
24. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Security
LTE
Dynamic Rate switching
32
25. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
802.11a
Single radio AP's
AP radio
BSSID (Basic Service Set identifier)
26. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Mismatched SSID
Quality of Service
Residential and Enterprise
27. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Carefully plan a strategy using WEP and VLANs
WEP
Wavelength
BSSID (Basic Service Set identifier)
28. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Repeater
Roaming
Obstacles
LTE
29. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
802.11b HR/DSSS and 802.11 DSSS
Workgroup Bridge mode.
64-bit - 128-bit
802.11b
30. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11w
802.11r
Acknowledgement frames
Walled Garden.
31. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Reflection
UNII
Frequency
Captive portal
32. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
Active mode
Restricts access to authorized users
Unicast
33. Two characteristics of signals are
Amplitude and phase
32 character maximum and is case sensitive
Small Office/Home Office Organizations (SOHO)
CCMP
34. Maximum length of data (Frame body) is 2304 when ____ is not in use
Personal mode and Enterprise Mode
SSID (service set identifier)
Encryption
Residential and Enterprise
35. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
Point-to-point link
Ad-Hoc
Walled Garden.
36. A basic service set identifier (BSSID) is the MAC address of the ____
OFDM
AP radio
BSSID (Basic Service Set identifier)
Repeater
37. High Throughput mode 0
Degradation
Master
Transmitter and receiver
Greenfield mode
38. A brute force attack is limited to breaking___ WEP keys
40 bit
Carefully plan a strategy using WEP and VLANs
802.11a
Wi-Fi Alliance
39. Name two absolute measures of RF power
Fakeauth
Secure Layer 3 transmissions over a public network infrastructure
Watt and mW
Bridge mode
40. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
32
SSID (service set identifier)
Unicast
802.11w
41. 802.11b is capable of which data rates?
40 bit
1 - 5.5 and 11 Mbps
7
Deauth
42. Name 3 channels considered non overlapping in the 2.4GHZ band
Greenfield mode
Acknowledgement frames
Workgroup Bridge mode.
1 -6 -11
43. The 802.11g standard uses which two speed spectrum technologies.
ERP-OFDM - DSSS
Managed
Unicast
WEP
44. Probe requests are used by clients as part of the ____ process
Active scanning
ERP protection
802.11w
MAC
45. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Access point
Know the SSID and enter it manually
Degradation
Restricts access to authorized users
46. A pre-shared key mode may be vulnerable to a ____ attack
Passive scan
Master
Dictionary
Fake auth
47. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
Wireless gateways
Managed
2.4-2.5GHz
48. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
802.11b HR/DSSS and 802.11 DSSS
Bridge mode
Acknowledgement frames
Semi directional and Highly directional
49. Wireless gateways come in two primary forms...
Repeater
Residential and Enterprise
WPA 2.0 personal and WPS
Single radio AP's
50. Both ___ and ___ are wireless LAN security methods that support shared key security.
Interoperability testing organization
Open system
Amplitude and phase
WPA2 -WEP
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests