SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Management
802.11i
Wavelength
Residential and Enterprise
2. 3 types of antennas
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
802.11i
Independent
Client
3. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Wavelength
11
Brute force - statistical and dictionary
Repeater
4. an 802.11b 2.4GHz channel is how wide in MHz?
Carefully plan a strategy using WEP and VLANs
Passphrase
25 MHz
22MHz wide
5. The 802.11g standard uses which two speed spectrum technologies.
ERP-OFDM - DSSS
ERP protection
Greenfield mode
3
6. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
1 -6 -11
Dictionary
ARP spoofing
Station (STA)
7. WI-Fi Protected Setup was designed for which of the following wireless applications?
802.11a
Small Office/Home Office Organizations (SOHO)
Personal mode and Enterprise Mode
Diffraction
8. Bridge mode will not allow client associations and is ______ only
802.11n
AP to AP
Extended Service Set (ESS)
2304 bytes
9. 802.11b is capable of which data rates?
Number of users and software applications in use
Two
1 - 5.5 and 11 Mbps
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
10. What type of algorithm does WPA use
2304 bytes
Access point
OFDM
TKIP - optional RC4
11. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
Passphrase
DBi
802.11
12. High throughput mode 3
802.11i
HT fixed mode
Active scanning
Deauth
13. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Other 802.11a devices
802.11b
Passphrase
Trojan/Rogue APs - Arp spoofing - DNS spoofing
14. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Open system and Shared key
Repeater
Interference from a neighboring access point RF denial-of-service (Dos) attack
15. These are user configurable and present in only five 802.11 frame types...
Spoof an address
SOHO brands that support WPS
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Service sets
16. Name two absolute measures of RF power
Restricts access to authorized users
Watt and mW
64-bit - 128-bit
3
17. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Walled Garden.
Indoor and outdoor
Wi-Fi Alliance
18. A newly configured wireless intrusion prevention system will___
1 -6 -11
Automatically monitor the network for attacks
Management - control - data
Residential and Enterprise
19. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Frequency
HT fixed mode
Reflection
20. ____ is also known as the Protected management frame standard
802.11w
Plaintext
Quality of Service
Know the SSID and enter it manually
21. An Ack is expected for every____ frame transmitted
Monitor
Beacons - Probe request - Probe response - Association Request - Reassociation Request
AP radio
Unicast
22. 802.11 uses CSMA/...
802.11b
A VPN to the office network
Wireless gateways
CA - Collision avoidance
23. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
DB and dBi
WPA2 -WEP
0
24. High Throughput mode 1
HT Non member protection mode
Fakeauth
Brute force - statistical and dictionary
Managed
25. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Know the SSID and enter it manually
LTE
Personal mode and Enterprise Mode
DBi
26. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Frequency
14
WPA 2.0 personal and WPS
Access point
27. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
FCC
Frequency
Management
UNII
28. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Client
Wi-Fi Alliance
Single radio AP's
Wavelength
29. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
AP radio
Automatically monitor the network for attacks
Antenna diversity
Interference from a neighboring access point RF denial-of-service (Dos) attack
30. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Refraction
Active scanning
Know the SSID and enter it manually
31. What type of certification came from 802.11i
Addresses wireless Quality of Service
802.11
WPA2
ERP-OFDM - DSSS
32. Management frames are sent in....
Wavelength
Plaintext
Dictionary
SOHO brands that support WPS
33. Two authentication types defined in the 802.11 standard
Two
22MHz wide
802.11w
Open system and Shared key
34. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
DB and dBi
RC4
Small Office/Home Office Organizations (SOHO)
PIN
35. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
AP radio
WPA Enterprise -WEP -MAC filters
Arp
Degradation
36. 802.11g LAN operates in what frequency range?
2.4-2.5GHz
802.11
FHSS
AP to AP
37. Three types of passive WEP attacks
Independent
Interoperability testing organization
Brute force - statistical and dictionary
Diffraction
38. The open system authentication process uses how many frames?
FCC
FHSS
Two
Frequency
39. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Deauth
Open system
40. A basic service set identifier (BSSID) is the MAC address of the ____
WPA2 -WEP
AP radio
CCMP
Acknowledgement frames
41. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
802.11r
Authenticate - associate
Spoof an address
Root mode
42. Probe requests are used by clients as part of the ____ process
Dictionary
Active scanning
Wireless gateways
7
43. In order to set up an ad hoc network a user must know which two parameters?
Quality of Service
Three
25 MHz
SSID and Channel
44. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
4 channels
802.11a
WPA2
Dictionary
45. The radio card can operate in one of up to six possible modes of operation...
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
2304 bytes
Data rate increases
Enter a username and password that will be central administered
46. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Independent
Degradation
Dual radio APs
Mesh network
47. A station can act as a routing node in a wireless mesh network
Independent
11
Mesh
802.11i
48. What best describes the Wi-Fi alliance?
Passive scan
6 -12 - and 24 Mbps
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Interoperability testing organization
49. Which items are unique to a service set identifier
3
2.4-2.5GHz
IPSec
32 character maximum and is case sensitive
50. This type of authentication is essentially 'Null authentication'
Restricts access to authorized users
Arp replay
ISM
Open system
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests