SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -1
Three
Passive scan
RTS/CTS
Fakeauth
2. What best describes the Wi-Fi alliance?
Other 802.11a devices
802.11a
Interoperability testing organization
Carefully plan a strategy using WEP and VLANs
3. The capacity of an access point is dependent upon which factors?
Dictionary
CCMP
Passphrase
Number of users and software applications in use
4. What is the gain of an antenna measured in
DBi
Point-to-point link
Repeater
802.11w
5. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
6. Which security feature provides the strongest security for a home-based wireless network?
Authentication
Passphrase
RC4
CCMP
7. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Repeater
Watt and mW
Enter a username and password that will be central administered
Captive portal
8. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Independent
Unicast
Arp replay
7
9. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Mismatched SSID
Management
Basic Service Set (BSS)
CCMP
10. In order to set up an ad hoc network a user must know which two parameters?
Other 802.11a devices
IPSec
64-bit - 128-bit
SSID and Channel
11. Collisions are detected through the use of....
SSID and Channel
Acknowledgement frames
7
Diffraction
12. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
Data rate increases
11
Service sets
13. When an RF signal bounces off a smooth non absorptive surface - the behavior is
ISM
HT Non member protection mode
32
Reflection
14. A brute force attack is limited to breaking___ WEP keys
40 bit
3
Arp
Active scanning
15. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
UNII
Interference from a neighboring access point RF denial-of-service (Dos) attack
BSSID (Basic Service Set identifier)
Mesh
16. This type of authentication is essentially 'Null authentication'
Open system
Dynamic Rate switching
802.11a
Master
17. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Indoor and outdoor
25 MHz
Monitor
Mismatched SSID
18. A basic service set (BSS) consists of how many access points
HT fixed mode
802.11r
Arp
1
19. an 802.11b 2.4GHz channel is how wide in MHz?
SSID and Channel
22MHz wide
Know the SSID and enter it manually
802.11i
20. Wireless gateways come in two primary forms...
Residential and Enterprise
WEP
Station (STA)
Antenna diversity
21. Which if the following organizations is responsible for standards compliance?
802.11
ARP spoofing
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Wi-Fi Alliance
22. Management frames are sent in....
Plaintext
Mesh
MAC
Number of users and software applications in use
23. High Throughput mode 1
One or more
Active mode
HT Non member protection mode
Know the SSID and enter it manually
24. A ______________ does not always use an omnidirectional antenna
UNII
4 channels
Point-to-point link
DBi
25. the amplitude of an RF signal is
Height of an RF signal
Point-to-point link
Access point
Bridge mode
26. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Basic Service Set (BSS)
Transmitter and receiver
25 MHz
Spoof an address
27. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Plaintext
Access point
Wireless gateways
Wi-Fi Alliance
28. High throughput mode 2
Point-to-point link
Security
HT 20 MHz protection mode
Greenfield mode
29. Both ___ and ___ are wireless LAN security methods that support shared key security.
Addresses wireless Quality of Service
HT fixed mode
ARP spoofing
WPA2 -WEP
30. Three types of passive WEP attacks
Interference from a neighboring access point RF denial-of-service (Dos) attack
11
Management
Brute force - statistical and dictionary
31. The Access point can operate in a variety of modes...
WEP
X.509 certificates on the subscriber side only.
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Personal mode and Enterprise Mode
32. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
802.11b HR/DSSS and 802.11 DSSS
SSID (service set identifier)
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
One or more
33. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
11
Reflection
SOHO brands that support WPS
Management
34. 3 types of antennas
ERP-OFDM - DSSS
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Passive scan
Passve Scanning
35. Which function does RBAC provide?
Fake auth
Authenticate - associate
Wireless gateways
Restricts access to authorized users
36. The 802.11i amendment to the standard addresses which of the following technologies?
CCMP
802.11n
Wavelength
Security
37. Which items are unique to a service set identifier
Spoof an address
Security
32 character maximum and is case sensitive
802.11w
38. 802.11a uses which spread spectrum technology?
OFDM
AP radio
Single radio AP's
802.11g
39. 4 types of Denial of Service attacks
1 -6 -11
25 MHz
SSID and Channel
CTS attacks - Deauth attack - Association flood - Jamming
40. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
Personal mode and Enterprise Mode
Restricts access to authorized users
Two
41. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Repeater
Antenna diversity
Wi-Fi Alliance
AP radio
42. What kind of Algorithm does WPA2 use?
DBi
11
Amplitude and phase
AES = CCMP required
43. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Secure Layer 3 transmissions over a public network infrastructure
Repeater
Roaming
Mesh network
44. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
RC4
Active scanning
SOHO brands that support WPS
Carefully plan a strategy using WEP and VLANs
45. The Layer 2 frame will be...
Active mode
Roaming
Open system and Shared key
Unencrypted
46. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
Mismatched SSID
Degradation
Diffraction
47. Which security methods do 802.11g access points support?
WPA Enterprise -WEP -MAC filters
802.11g
802.11w
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
48. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Obstacles
RTS/CTS
Two
49. WPA was developed as an interim solution for which amendment to the 802.11 standards?
32
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
TKIP - optional RC4
802.11i
50. Layer 2 Tunneling Protocol commonly uses which encryption method?
11
802.11
ERP protection
IPSec