SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Collisions are detected through the use of....
Dual radio APs
Workgroup Bridge mode.
AP radio
Acknowledgement frames
2. Layer 2 Tunneling Protocol commonly uses which encryption method?
Plaintext
IPSec
Repeater
CTS attacks - Deauth attack - Association flood - Jamming
3. What kind of Algorithm does WPA2 use?
802.11r
Repeater
Refraction
AES = CCMP required
4. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Plaintext
FHSS
Repeater
Authenticate - associate
5. 802.11b is capable of which data rates?
1 - 5.5 and 11 Mbps
802.11g
Active scanning
4 channels
6. The security amendment to the IEEE 802.11 standard requires ____
Beacons - Probe request - Probe response - Association Request - Reassociation Request
CCMP
Carefully plan a strategy using WEP and VLANs
Personal mode and Enterprise Mode
7. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Walled Garden.
RC4
802.11i
Beacons - Probe request - Probe response - Association Request - Reassociation Request
8. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Quality of Service
Wavelength
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Residential and Enterprise
9. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Dual radio APs
Encryption
25 MHz
2304 bytes
10. An Ack is expected for every____ frame transmitted
Three
Unicast
UNII
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
11. These are user configurable and present in only five 802.11 frame types...
PIN
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
WPA2 -WEP
12. Three types of MITM attacks
6 -12 - and 24 Mbps
WPA/WPA2
Transmitter and receiver
Trojan/Rogue APs - Arp spoofing - DNS spoofing
13. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
WPA Enterprise -WEP -MAC filters
Other 802.11a devices
Trojan/Rogue APs - Arp spoofing - DNS spoofing
WPA2 -WEP
14. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
Semi directional and Highly directional
1 - 5.5 and 11 Mbps
Wireless Game adapters and Media Bridges
15. A basic service set identifier (BSSID) is the MAC address of the ____
AP radio
802.11g
Automatically monitor the network for attacks
Security
16. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
Enter a username and password that will be central administered
Mesh network
Personal mode and Enterprise Mode
17. Management frames are sent in....
Plaintext
RC4
32
AP radio
18. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Station (STA)
Monitor
LTE
IPSec
19. High Throughput mode 0
Mesh
Greenfield mode
Enter a username and password that will be central administered
Walled Garden.
20. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
21. A ______________ does not always use an omnidirectional antenna
Point-to-point link
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Reflection
Secure Layer 3 transmissions over a public network infrastructure
22. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Passve Scanning
Station (STA)
64-bit - 128-bit
TKIP - optional RC4
23. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
A VPN to the office network
SOHO brands that support WPS
Fakeauth
24. Which if the following organizations is responsible for standards compliance?
OFDM
Plaintext
Wi-Fi Alliance
Data rate increases
25. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Two
Mismatched SSID
Open system and Shared key
Dynamic Rate switching
26. Which data encryption.authentication method is identified in the IEEE 802.11 standard
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Quality of Service
WEP
64-bit - 128-bit
27. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Watt and mW
Trojan/Rogue APs
Automatically monitor the network for attacks
HT Non member protection mode
28. In order to set up an ad hoc network a user must know which two parameters?
Secure Layer 3 transmissions over a public network infrastructure
Enter a username and password that will be central administered
Height of an RF signal
SSID and Channel
29. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
RTS/CTS
PIN
Mesh network
802.11r
30. What item has an effect on RF line of site?
Diffraction
Obstacles
Acknowledgement frames
Trojan/Rogue APs - Arp spoofing - DNS spoofing
31. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
WPA 2.0 personal and WPS
OFDM
2.4-2.5GHz
Enter a username and password that will be central administered
32. In bluetooth - one master may communicate with up to ___ slaves in a piconet
WEP
Small Office/Home Office Organizations (SOHO)
WPA 2.0 personal and WPS
7
33. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
PIN
Service sets
Data rate increases
Know the SSID and enter it manually
34. This is a topology in which two or more APs are connected by a common distribution system.
LTE
Frequency
Extended Service Set (ESS)
14
35. Wireless gateways come in two primary forms...
Root mode
Residential and Enterprise
Diffraction
Access point
36. ___ are used to describe the basic components and topology of a WLAN
Service sets
Degradation
Dynamic Rate switching
802.11
37. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Mesh network
Access point
Walled Garden.
LTE
38. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Reflection
Managed
14
Client
39. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Monitor
Secure Layer 3 transmissions over a public network infrastructure
Number of users and software applications in use
IPSec
40. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
WPA Enterprise -WEP -MAC filters
4 channels
PIN
Captive portal
41. A station can act as a routing node in a wireless mesh network
Client
7
Single radio AP's
Mesh
42. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
AP radio
Trojan/Rogue APs - Arp spoofing - DNS spoofing
802.11n
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
43. According to the 802.11a amendment - which data rates are mandatory?
Point-to-point link
6 -12 - and 24 Mbps
Repeater
Three
44. the amplitude of an RF signal is
SSID (service set identifier)
Height of an RF signal
Enter a username and password that will be central administered
TKIP - optional RC4
45. Aireplay-ng -1
802.11w
Spoof an address
Fakeauth
Amplitude and phase
46. Maximum length of data (Frame body) is 2304 when ____ is not in use
Access point
WPA Enterprise -WEP -MAC filters
Wireless Game adapters and Media Bridges
Encryption
47. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
Station (STA)
Active mode
Passive scan
48. A pre-shared key mode may be vulnerable to a ____ attack
WPA2 -WEP
Small Office/Home Office Organizations (SOHO)
Dictionary
Access point
49. The open system authentication process uses how many frames?
Two
Mismatched SSID
Indoor and outdoor
IPSec
50. High throughput mode 3
WPA/WPA2
RTS/CTS
HT fixed mode
Residential and Enterprise