SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Managed
Access point
2.4-2.5GHz
14
2. Point to Point links typically use which antenna types?
Unicast
Semi directional and Highly directional
One or more
2304 bytes
3. In this mode a station can act as a relay or WLAN range extender
Repeater
Trojan/Rogue APs - Arp spoofing - DNS spoofing
32
ARP spoofing
4. 802.11 frames have a maximum 'upper-layer' payload of...
WPA/WPA2
40 bit
2304 bytes
Enter a username and password that will be central administered
5. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Greenfield mode
Antenna diversity
Single radio AP's
TKIP - optional RC4
6. In repeater mode - the repeater device connects to a normal '___ mode'
FHSS
Root mode
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Wireless Game adapters and Media Bridges
7. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Frequency
1 - 5.5 and 11 Mbps
A VPN to the office network
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
8. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
11
Root mode
802.11b HR/DSSS and 802.11 DSSS
Basic Service Set (BSS)
9. Which security methods do 802.11g access points support?
Root mode
Other 802.11a devices
WPA Enterprise -WEP -MAC filters
Reflection
10. A basic service set identifier (BSSID) is the MAC address of the ____
Secure Layer 3 transmissions over a public network infrastructure
DB and dBi
Passve Scanning
AP radio
11. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Unicast
Carefully plan a strategy using WEP and VLANs
AP radio
12. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Repeater
Service sets
Independent
Two
13. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
802.11i
HT Non member protection mode
1 -6 -11
Authenticate - associate
14. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Open system and Shared key
Carefully plan a strategy using WEP and VLANs
Amplitude and phase
Management - control - data
15. A station can act as a routing node in a wireless mesh network
Authentication
WPA2
Mesh
1 - 5.5 and 11 Mbps
16. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Secure Layer 3 transmissions over a public network infrastructure
25 MHz
Brute force - statistical and dictionary
Greenfield mode
17. Three types of MITM attacks
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Repeater
11
Mesh network
18. This is a topology in which two or more APs are connected by a common distribution system.
Amplitude and phase
Extended Service Set (ESS)
Interference from a neighboring access point RF denial-of-service (Dos) attack
HT fixed mode
19. What is the gain of an antenna measured in
Walled Garden.
Repeater
FCC
DBi
20. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Ad-Hoc
Three
Quality of Service
RC4
21. What item has an effect on RF line of site?
Obstacles
4 channels
Greenfield mode
Three
22. Which process is a VPN solution intended to provide for users connection to a network
Automatically monitor the network for attacks
Secure Layer 3 transmissions over a public network infrastructure
Monitor
Wavelength
23. A basic service set (BSS) consists of how many access points
X.509 certificates on the subscriber side only.
1
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
OFDM
24. What is regarded in 802.11e?
Addresses wireless Quality of Service
Number of users and software applications in use
FHSS
Walled Garden.
25. Give two examples of WGB devices.
Wireless Game adapters and Media Bridges
Security
Dictionary
Point-to-point link
26. In order to set up an ad hoc network a user must know which two parameters?
Mismatched SSID
Wavelength
Plaintext
SSID and Channel
27. Layer 2 Tunneling Protocol commonly uses which encryption method?
IPSec
AP radio
Managed
Authentication
28. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
SSID and Channel
RC4
7
Indoor and outdoor
29. Bluetooth uses a radio technology called
802.11b HR/DSSS and 802.11 DSSS
Service sets
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
FHSS
30. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Passphrase
OFDM
802.11g
SSID (service set identifier)
31. What kind of Algorithm does WPA2 use?
TKIP - optional RC4
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
32
AES = CCMP required
32. The 802.11g standard uses which two speed spectrum technologies.
HT Non member protection mode
Management
AP to AP
ERP-OFDM - DSSS
33. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Addresses wireless Quality of Service
14
Height of an RF signal
Master
34. The length of a WEP key is typically ___ or ___
RC4
64-bit - 128-bit
Watt and mW
SOHO brands that support WPS
35. Aireplay-ng -1
802.11w
Fakeauth
SOHO brands that support WPS
Secure Layer 3 transmissions over a public network infrastructure
36. High throughput mode 2
SSID and Channel
Open system
HT 20 MHz protection mode
SOHO brands that support WPS
37. Which security feature provides the strongest security for a home-based wireless network?
CA - Collision avoidance
Passphrase
WPA2
ERP protection
38. An independent basic service set (IBSS) consists of how many access points?
Managed
Access point
Reflection
0
39. Collisions are detected through the use of....
Acknowledgement frames
Open system
ERP protection
ARP spoofing
40. What two devices use RF to communicate
Transmitter and receiver
Passphrase
UNII
Wireless gateways
41. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Passphrase
Active mode
Secure Layer 3 transmissions over a public network infrastructure
Interference from a neighboring access point RF denial-of-service (Dos) attack
42. This is the default mode that sets the card as a client that could then connect to an AP
Antenna diversity
Authenticate - associate
Single radio AP's
Managed
43. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Reflection
Trojan/Rogue APs
Management - control - data
Active mode
44. This type of authentication is essentially 'Null authentication'
Interoperability testing organization
Interference from a neighboring access point RF denial-of-service (Dos) attack
Arp
Open system
45. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
ERP protection
WPA 2.0 personal and WPS
25 MHz
Dual radio APs
46. Two authentication types defined in the 802.11 standard
Open system and Shared key
25 MHz
32 character maximum and is case sensitive
Authentication
47. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Mismatched SSID
Authenticate - associate
Obstacles
Dual radio APs
48. Wireless gateways come in two primary forms...
ISM
Residential and Enterprise
Quality of Service
Diffraction
49. This is typically the 48-bit MAC address of the access point's radio card.
Wi-Fi Alliance
BSSID (Basic Service Set identifier)
Arp replay
Indoor and outdoor
50. Typically a point-to-multipoint link consists of ____ connections
Active scanning
Three
Diffraction
Quality of Service