SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Bluetooth uses a radio technology called
802.11b HR/DSSS and 802.11 DSSS
WPA2 -WEP
FHSS
40 bit
2. What is regarded in 802.11e?
Addresses wireless Quality of Service
Basic Service Set (BSS)
Arp
LTE
3. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
Fake auth
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
AP to AP
4. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
DB and dBi
802.11i
Enter a username and password that will be central administered
Diffraction
5. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
Walled Garden.
Frequency
Quality of Service
6. 802.11g LAN operates in what frequency range?
Amplitude and phase
2.4-2.5GHz
Transmitter and receiver
Dynamic Rate switching
7. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Quality of Service
Encryption
Bridge mode
8. This type of authentication is essentially 'Null authentication'
FCC
Diffraction
Management - control - data
Open system
9. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Independent
Semi directional and Highly directional
Reflection
Master
10. ____ is also known as the Protected management frame standard
802.11b HR/DSSS and 802.11 DSSS
Quality of Service
802.11w
Bridge mode
11. Probe requests are used by clients as part of the ____ process
Active scanning
Bridge mode
25 MHz
Wavelength
12. The open system authentication process uses how many frames?
Diffraction
2304 bytes
Two
Three
13. Give two examples of WGB devices.
Antenna diversity
Wireless Game adapters and Media Bridges
ARP spoofing
Restricts access to authorized users
14. What two devices use RF to communicate
802.11b HR/DSSS and 802.11 DSSS
Transmitter and receiver
Wireless gateways
Management
15. What algorithm does WEP use
Frequency
SSID (service set identifier)
TKIP - optional RC4
RC4
16. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
802.11b HR/DSSS and 802.11 DSSS
Master
HT 20 MHz protection mode
17. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Roaming
Restricts access to authorized users
DB and dBi
18. High throughput mode 2
HT 20 MHz protection mode
CTS attacks - Deauth attack - Association flood - Jamming
22MHz wide
Monitor
19. 802.11 frames have a maximum 'upper-layer' payload of...
Degradation
OFDM
Authenticate - associate
2304 bytes
20. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
A VPN to the office network
CA - Collision avoidance
11
Mismatched SSID
21. 802.11 uses CSMA/...
CA - Collision avoidance
Other 802.11a devices
Wireless gateways
25 MHz
22. Wireless gateways come in two primary forms...
Residential and Enterprise
Managed
Encryption
Active scanning
23. In repeater mode - the repeater device connects to a normal '___ mode'
X.509 certificates on the subscriber side only.
Root mode
One or more
HT Non member protection mode
24. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
PIN
Degradation
One or more
Security
25. A newly configured wireless intrusion prevention system will___
Deauth
Open system and Shared key
Automatically monitor the network for attacks
Dual radio APs
26. 4 types of Denial of Service attacks
Small Office/Home Office Organizations (SOHO)
CTS attacks - Deauth attack - Association flood - Jamming
Indoor and outdoor
Active mode
27. The 802.11g standard uses which two speed spectrum technologies.
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Brute force - statistical and dictionary
ERP-OFDM - DSSS
7
28. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
Open system
ARP spoofing
0
29. Which if the following organizations is responsible for standards compliance?
Diffraction
Master
Acknowledgement frames
Wi-Fi Alliance
30. Both ___ and ___ are wireless LAN security methods that support shared key security.
14
Frequency
WPA2 -WEP
Mesh
31. The length of a WEP key is typically ___ or ___
Mismatched SSID
AP to AP
Diffraction
64-bit - 128-bit
32. the amplitude of an RF signal is
Enter a username and password that will be central administered
CA - Collision avoidance
A VPN to the office network
Height of an RF signal
33. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
4 channels
SSID and Channel
Mesh
SSID (service set identifier)
34. Which security methods do 802.11g access points support?
Dynamic Rate switching
Two
Passive scan
WPA Enterprise -WEP -MAC filters
35. Point to Point links typically use which antenna types?
Extended Service Set (ESS)
Two
Semi directional and Highly directional
2304 bytes
36. High Throughput mode 1
HT Non member protection mode
Transmitter and receiver
RTS/CTS
Workgroup Bridge mode.
37. ___ are used to describe the basic components and topology of a WLAN
Service sets
Automatically monitor the network for attacks
Wireless Game adapters and Media Bridges
Master
38. An independent basic service set (IBSS) consists of how many access points?
ARP spoofing
0
Indoor and outdoor
Roaming
39. This is the default mode that sets the card as a client that could then connect to an AP
Spoof an address
802.11i
Trojan/Rogue APs
Managed
40. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Wireless gateways
Other 802.11a devices
25 MHz
ERP protection
41. These are user configurable and present in only five 802.11 frame types...
Repeater
Spoof an address
Beacons - Probe request - Probe response - Association Request - Reassociation Request
PIN
42. Collisions are detected through the use of....
Security
Fakeauth
Acknowledgement frames
Arp replay
43. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
ERP protection
WEP
Station (STA)
FHSS
44. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Amplitude and phase
Degradation
Basic Service Set (BSS)
FHSS
45. A pre-shared key mode may be vulnerable to a ____ attack
CA - Collision avoidance
ISM
Dictionary
14
46. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Extended Service Set (ESS)
Residential and Enterprise
14
47. Name two relative measures of power
DB and dBi
Dynamic Rate switching
Reflection
WPA/WPA2
48. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Access point
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Trojan/Rogue APs
Other 802.11a devices
49. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Mismatched SSID
Wireless gateways
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Dictionary
50. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ERP-OFDM - DSSS
Trojan/Rogue APs - Arp spoofing - DNS spoofing
ISM
Trojan/Rogue APs