SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -0
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Refraction
32
Deauth
2. What kind of Algorithm does WPA2 use?
AES = CCMP required
7
Walled Garden.
Passive scan
3. A basic service set (BSS) consists of how many access points
1
25 MHz
FHSS
Amplitude and phase
4. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
Authenticate - associate
DB and dBi
2.4-2.5GHz
5. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
WPA/WPA2
Quality of Service
Enter a username and password that will be central administered
FHSS
6. Point to Point links typically use which antenna types?
Walled Garden.
Fake auth
Station (STA)
Semi directional and Highly directional
7. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
Captive portal
Active mode
802.11r
8. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
802.11r
BSSID (Basic Service Set identifier)
Passve Scanning
9. High throughput mode 3
Service sets
Dual radio APs
HT fixed mode
Single radio AP's
10. What two devices use RF to communicate
7
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Transmitter and receiver
Managed
11. 802.11b is capable of which data rates?
WPA/WPA2
Wi-Fi Alliance
802.11a
1 - 5.5 and 11 Mbps
12. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Residential and Enterprise
LTE
Frequency
1 -6 -11
13. A newly configured wireless intrusion prevention system will___
4 channels
Passive scan
Automatically monitor the network for attacks
Height of an RF signal
14. What best describes the Wi-Fi alliance?
Acknowledgement frames
Interoperability testing organization
Residential and Enterprise
Obstacles
15. What type of certification came from 802.11i
WPA2
TKIP - optional RC4
ERP protection
Restricts access to authorized users
16. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
PIN
Wireless Game adapters and Media Bridges
Trojan/Rogue APs
Acknowledgement frames
17. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
3
Authentication
Captive portal
Restricts access to authorized users
18. Give two examples of WGB devices.
Dictionary
802.11g
Wireless Game adapters and Media Bridges
Unencrypted
19. Wireless gateways come in two primary forms...
1 -6 -11
Residential and Enterprise
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
6 -12 - and 24 Mbps
20. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Wireless gateways
40 bit
Fake auth
21. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
ERP protection
2304 bytes
802.11a
Unencrypted
22. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Personal mode and Enterprise Mode
802.11b
Antenna diversity
Reflection
23. High Throughput mode 0
Greenfield mode
WPA Enterprise -WEP -MAC filters
Fake auth
Management - control - data
24. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Root mode
LTE
Secure Layer 3 transmissions over a public network infrastructure
One or more
25. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Client
Workgroup Bridge mode.
Fake auth
Degradation
26. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Reflection
Two
Transmitter and receiver
27. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
SSID (service set identifier)
32
Active scanning
Interoperability testing organization
28. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Active mode
Spoof an address
Refraction
ISM
29. Name two absolute measures of RF power
Service sets
Watt and mW
Passve Scanning
32
30. 802.11 frames have a maximum 'upper-layer' payload of...
2304 bytes
Service sets
HT Non member protection mode
Encryption
31. WPA was developed as an interim solution for which amendment to the 802.11 standards?
11
802.11i
A VPN to the office network
Service sets
32. A pre-shared key mode may be vulnerable to a ____ attack
Walled Garden.
Dictionary
22MHz wide
Mesh
33. A service set identifier (SSID) has a maximum limit of how many characters?
Reflection
SSID (service set identifier)
Independent
32
34. This sets the card to participate in an independent basic service set
Obstacles
Ad-Hoc
Unicast
Authenticate - associate
35. This is typically the 48-bit MAC address of the access point's radio card.
Station (STA)
Transmitter and receiver
Obstacles
BSSID (Basic Service Set identifier)
36. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Transmitter and receiver
Greenfield mode
Reflection
Master
37. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
WPA2 -WEP
WEP
Transmitter and receiver
38. In repeater mode - the repeater device connects to a normal '___ mode'
Security
Station (STA)
Root mode
ISM
39. In this mode - the card acts as a normal access point
FHSS
WPA2 -WEP
MAC
Master
40. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
41. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
A VPN to the office network
Know the SSID and enter it manually
Frequency
4 channels
42. Name 3 channels considered non overlapping in the 2.4GHZ band
WEP
4 channels
1 -6 -11
FHSS
43. What item has an effect on RF line of site?
Obstacles
Open system and Shared key
Walled Garden.
Interoperability testing organization
44. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
WPA2 -WEP
Plaintext
802.11w
45. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Interoperability testing organization
WPA2 -WEP
Independent
802.11
46. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
25 MHz
ERP protection
ARP spoofing
Beacons - Probe request - Probe response - Association Request - Reassociation Request
47. Two authentication types defined in the 802.11 standard
Service sets
Semi directional and Highly directional
Independent
Open system and Shared key
48. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Plaintext
IPSec
Bridge mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
49. High throughput mode 2
802.11a
Point-to-point link
HT 20 MHz protection mode
Wavelength
50. Which if the following organizations is responsible for standards compliance?
802.11n
Wi-Fi Alliance
Greenfield mode
Open system and Shared key