SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. In this mode - the card acts as a normal access point
Master
802.11w
Transmitter and receiver
1 - 5.5 and 11 Mbps
2. Which process is a VPN solution intended to provide for users connection to a network
FCC
Secure Layer 3 transmissions over a public network infrastructure
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Repeater
3. According to the 802.11a amendment - which data rates are mandatory?
22MHz wide
Arp replay
WEP
6 -12 - and 24 Mbps
4. 802.11b is capable of which data rates?
1 - 5.5 and 11 Mbps
BSSID (Basic Service Set identifier)
Active mode
Arp
5. WiMAX 802.16 authentication is based on...
Mesh network
X.509 certificates on the subscriber side only.
Passphrase
Brute force - statistical and dictionary
6. What item has an effect on RF line of site?
CTS attacks - Deauth attack - Association flood - Jamming
Mesh
SOHO brands that support WPS
Obstacles
7. ____ is also known as the Protected management frame standard
6 -12 - and 24 Mbps
802.11w
Deauth
Management - control - data
8. What is regarded in 802.11e?
Active mode
Independent
Addresses wireless Quality of Service
Roaming
9. 802.11 uses CSMA/...
CA - Collision avoidance
Obstacles
Authenticate - associate
Frequency
10. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
RTS/CTS
AP to AP
Passphrase
Mismatched SSID
11. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
SOHO brands that support WPS
Know the SSID and enter it manually
Wireless gateways
Unencrypted
12. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
Residential and Enterprise
Dictionary
ERP protection
Interference from a neighboring access point RF denial-of-service (Dos) attack
13. The radio card can operate in one of up to six possible modes of operation...
Basic Service Set (BSS)
Frequency
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Passive scan
14. In this mode a station can act as a relay or WLAN range extender
Obstacles
Repeater
Wireless Game adapters and Media Bridges
25 MHz
15. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Mismatched SSID
Diffraction
Enter a username and password that will be central administered
802.11r
16. Aireplay-ng -1
Arp replay
ERP-OFDM - DSSS
Trojan/Rogue APs
Fakeauth
17. A ______________ does not always use an omnidirectional antenna
AP to AP
25 MHz
LTE
Point-to-point link
18. When an RF signal passes between mediums of different densities and may change speeds and bend - the behavior is...
802.11b HR/DSSS and 802.11 DSSS
HT fixed mode
Refraction
64-bit - 128-bit
19. The 802.11g standard uses which two speed spectrum technologies.
SOHO brands that support WPS
ERP-OFDM - DSSS
Dynamic Rate switching
Station (STA)
20. A service set identifier (SSID) has a maximum limit of how many characters?
32
2304 bytes
802.11w
Interference from a neighboring access point RF denial-of-service (Dos) attack
21. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Mesh
3
One or more
Workgroup Bridge mode.
22. Three types of passive WEP attacks
Brute force - statistical and dictionary
Mesh
Passve Scanning
Managed
23. This sets the card to participate in an independent basic service set
Ad-Hoc
AP to AP
Arp
22MHz wide
24. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
Encryption
2.4-2.5GHz
Trojan/Rogue APs - Arp spoofing - DNS spoofing
25. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
Authentication
2304 bytes
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
26. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
Wavelength
CTS attacks - Deauth attack - Association flood - Jamming
14
27. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
4 channels
802.11i
3
Access point
28. 802.11w can only be used in networks using_____
SSID (service set identifier)
802.11i
Basic Service Set (BSS)
WPA/WPA2
29. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Trojan/Rogue APs
25 MHz
Interoperability testing organization
Transmitter and receiver
30. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
Carefully plan a strategy using WEP and VLANs
Mismatched SSID
IPSec
31. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Access point
Service sets
Repeater
Wi-Fi Alliance
32. Which function does RBAC provide?
Carefully plan a strategy using WEP and VLANs
Unicast
Authenticate - associate
Restricts access to authorized users
33. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
FHSS
Wireless Game adapters and Media Bridges
2304 bytes
Quality of Service
34. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Trojan/Rogue APs - Arp spoofing - DNS spoofing
802.11b
Passive scan
35. High Throughput mode 1
Acknowledgement frames
Secure Layer 3 transmissions over a public network infrastructure
HT Non member protection mode
AES = CCMP required
36. The Access point can operate in a variety of modes...
WPA2 -WEP
Active scanning
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
SSID and Channel
37. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
11
Ad-Hoc
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Station (STA)
38. the amplitude of an RF signal is
Wireless Game adapters and Media Bridges
Point-to-point link
Height of an RF signal
Know the SSID and enter it manually
39. These are user configurable and present in only five 802.11 frame types...
Beacons - Probe request - Probe response - Association Request - Reassociation Request
ERP-OFDM - DSSS
Open system and Shared key
Dual radio APs
40. Which security methods do 802.11g access points support?
Management - control - data
WPA/WPA2
Basic Service Set (BSS)
WPA Enterprise -WEP -MAC filters
41. Layer 2 Tunneling Protocol commonly uses which encryption method?
Walled Garden.
Dictionary
IPSec
Refraction
42. Two characteristics of signals are
Frequency
Amplitude and phase
1 -6 -11
Carefully plan a strategy using WEP and VLANs
43. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
DBi
Authenticate - associate
Active mode
40 bit
44. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Authenticate - associate
11
6 -12 - and 24 Mbps
45. The process in which a wireless LAN clients connection moves from one access point to another is called ______
Roaming
Arp
AP radio
FCC
46. A station can act as a routing node in a wireless mesh network
802.11i
Mesh
Bridge mode
X.509 certificates on the subscriber side only.
47. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Point-to-point link
7
802.11b
4 channels
48. What algorithm does WEP use
Small Office/Home Office Organizations (SOHO)
Know the SSID and enter it manually
RC4
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
49. The capacity of an access point is dependent upon which factors?
Access point
Number of users and software applications in use
32 character maximum and is case sensitive
1 -6 -11
50. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Quality of Service
Mesh network
Spoof an address
Interference from a neighboring access point RF denial-of-service (Dos) attack