SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Data rate increases
Mismatched SSID
WEP
2. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Deauth
11
Other 802.11a devices
Refraction
3. A pre-shared key mode may be vulnerable to a ____ attack
AES = CCMP required
Dictionary
Restricts access to authorized users
DB and dBi
4. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
25 MHz
Indoor and outdoor
Basic Service Set (BSS)
Passphrase
5. This is the default mode that sets the card as a client that could then connect to an AP
Managed
Plaintext
CTS attacks - Deauth attack - Association flood - Jamming
Dynamic Rate switching
6. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Root mode
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Arp replay
Three
7. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Security
Quality of Service
HT fixed mode
32 character maximum and is case sensitive
8. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
AES = CCMP required
Height of an RF signal
Wireless gateways
3
9. According to the 802.11a amendment - which data rates are mandatory?
6 -12 - and 24 Mbps
Mesh
Master
11
10. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Dual radio APs
ERP-OFDM - DSSS
LTE
32 character maximum and is case sensitive
11. ____ is also known as the Protected management frame standard
802.11w
RC4
Active mode
6 -12 - and 24 Mbps
12. Aireplay-ng -1
Master
Small Office/Home Office Organizations (SOHO)
WEP
Fakeauth
13. A brute force attack is limited to breaking___ WEP keys
40 bit
Height of an RF signal
Mesh network
FCC
14. A newly configured wireless intrusion prevention system will___
Small Office/Home Office Organizations (SOHO)
32
Authenticate - associate
Automatically monitor the network for attacks
15. A weakness with MAC filtering is that it allows an intruder to ____
Frequency
802.11g
MAC
Spoof an address
16. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Point-to-point link
32 character maximum and is case sensitive
Wi-Fi Alliance
Bridge mode
17. Maximum length of data (Frame body) is 2304 when ____ is not in use
Encryption
Arp replay
Enter a username and password that will be central administered
Station (STA)
18. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
DBi
Number of users and software applications in use
Management
Active mode
19. The 802.11g standard uses which two speed spectrum technologies.
Open system
Bridge mode
ERP-OFDM - DSSS
Walled Garden.
20. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
Transmitter and receiver
40 bit
Acknowledgement frames
21. High Throughput mode 0
Greenfield mode
ERP-OFDM - DSSS
PIN
3
22. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
ERP-OFDM - DSSS
HT Non member protection mode
Interference from a neighboring access point RF denial-of-service (Dos) attack
4 channels
23. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
FHSS
Monitor
64-bit - 128-bit
Root mode
24. In this mode - the card acts as a normal access point
Master
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
AP to AP
FCC
25. the amplitude of an RF signal is
AES = CCMP required
Authenticate - associate
802.11g
Height of an RF signal
26. The association process happens after which phase?
Authentication
One or more
Workgroup Bridge mode.
Amplitude and phase
27. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Bridge mode
WPA/WPA2
28. What is the gain of an antenna measured in
AP to AP
CCMP
Authentication
DBi
29. Name two absolute measures of RF power
Frequency
802.11i
Watt and mW
AES = CCMP required
30. Which if the following organizations is responsible for standards compliance?
LTE
Wi-Fi Alliance
802.11n
2304 bytes
31. Two characteristics of signals are
802.11g
LTE
Amplitude and phase
Greenfield mode
32. 802.11 uses CSMA/...
802.11g
CA - Collision avoidance
32
Transmitter and receiver
33. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
ARP spoofing
Enter a username and password that will be central administered
Repeater
64-bit - 128-bit
34. Two authentication types defined in the 802.11 standard
Dictionary
802.11b HR/DSSS and 802.11 DSSS
Open system and Shared key
Semi directional and Highly directional
35. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Refraction
CA - Collision avoidance
Frequency
36. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Unicast
32 character maximum and is case sensitive
ERP protection
Station (STA)
37. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
IPSec
LTE
Mesh
38. Aireplay-ng -0
DBi
32
Deauth
Automatically monitor the network for attacks
39. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Enter a username and password that will be central administered
Know the SSID and enter it manually
Number of users and software applications in use
Indoor and outdoor
40. What two devices use RF to communicate
AP radio
Transmitter and receiver
64-bit - 128-bit
802.11a
41. What is regarded in 802.11e?
Addresses wireless Quality of Service
IPSec
Independent
Authenticate - associate
42. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
SOHO brands that support WPS
Fake auth
Brute force - statistical and dictionary
Management - control - data
43. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
RC4
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Know the SSID and enter it manually
Carefully plan a strategy using WEP and VLANs
44. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
Antenna diversity
Wi-Fi Alliance
11
Passve Scanning
45. What type of certification came from 802.11i
802.11
SSID (service set identifier)
OFDM
WPA2
46. The Access point can operate in a variety of modes...
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Restricts access to authorized users
Passve Scanning
FCC
47. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
MAC
Data rate increases
X.509 certificates on the subscriber side only.
One or more
48. The open system authentication process uses how many frames?
32 character maximum and is case sensitive
Arp
802.11n
Two
49. What kind of Algorithm does WPA2 use?
AES = CCMP required
Captive portal
ARP spoofing
Transmitter and receiver
50. What item has an effect on RF line of site?
Obstacles
22MHz wide
802.11a
Point-to-point link
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests