SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Two authentication types defined in the 802.11 standard
Open system and Shared key
Brute force - statistical and dictionary
802.11b HR/DSSS and 802.11 DSSS
CCMP
2. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wavelength
A VPN to the office network
Wireless gateways
One or more
3. A service set identifier (SSID) has a maximum limit of how many characters?
7
Extended Service Set (ESS)
Antenna diversity
32
4. Which if the following organizations is responsible for standards compliance?
Wi-Fi Alliance
Bridge mode
14
Client
5. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
11
Access point
Amplitude and phase
Unencrypted
6. What two devices use RF to communicate
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
2304 bytes
Transmitter and receiver
Managed
7. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
ERP protection
Root mode
Restricts access to authorized users
Workgroup Bridge mode.
8. Maximum length of data (Frame body) is 2304 when ____ is not in use
MAC
Extended Service Set (ESS)
Encryption
Diffraction
9. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
SSID and Channel
HT fixed mode
Wavelength
Dictionary
10. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Obstacles
Active mode
OFDM
Quality of Service
11. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Client
Other 802.11a devices
Basic Service Set (BSS)
SOHO brands that support WPS
12. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Obstacles
Two
Dual radio APs
Enter a username and password that will be central administered
13. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Deauth
Plaintext
HT Non member protection mode
LTE
14. What kind of Algorithm does WPA2 use?
Watt and mW
Antenna diversity
ISM
AES = CCMP required
15. Which security feature provides the strongest security for a home-based wireless network?
802.11i
Obstacles
Passphrase
802.11a
16. An Ack is expected for every____ frame transmitted
IPSec
Unicast
FCC
25 MHz
17. This sets the card to participate in an independent basic service set
Ad-Hoc
Deauth
TKIP - optional RC4
Greenfield mode
18. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
802.11r
OFDM
Know the SSID and enter it manually
11
19. A weakness with MAC filtering is that it allows an intruder to ____
Mesh
Acknowledgement frames
Monitor
Spoof an address
20. What organization is responsible for unlicensed frequency band regulations in the United States?
40 bit
FCC
Fakeauth
Access point
21. an 802.11b 2.4GHz channel is how wide in MHz?
22MHz wide
IPSec
CTS attacks - Deauth attack - Association flood - Jamming
UNII
22. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
32
One or more
Access point
DBi
23. High Throughput mode 0
WPA 2.0 personal and WPS
Greenfield mode
Semi directional and Highly directional
25 MHz
24. Collisions are detected through the use of....
Active scanning
Acknowledgement frames
Spoof an address
Mismatched SSID
25. 802.11w can only be used in networks using_____
Interoperability testing organization
Wavelength
Beacons - Probe request - Probe response - Association Request - Reassociation Request
WPA/WPA2
26. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
Station (STA)
SSID (service set identifier)
7
25 MHz
27. This type of authentication is essentially 'Null authentication'
Open system
22MHz wide
Basic Service Set (BSS)
1
28. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Addresses wireless Quality of Service
802.11i
WPA 2.0 personal and WPS
Access point
29. High throughput mode 2
HT 20 MHz protection mode
Watt and mW
Amplitude and phase
Root mode
30. Which security methods do 802.11g access points support?
TKIP - optional RC4
Spoof an address
Plaintext
WPA Enterprise -WEP -MAC filters
31. Which items are unique to a service set identifier
0
32 character maximum and is case sensitive
MAC
Ad-Hoc
32. A pre-shared key mode may be vulnerable to a ____ attack
Unencrypted
Wireless gateways
Dictionary
Quality of Service
33. When RF passes or bends around an obstacle such as a building or column - the behavior is
CA - Collision avoidance
Extended Service Set (ESS)
Diffraction
Wireless Game adapters and Media Bridges
34. According to the 802.11a amendment - which data rates are mandatory?
6 -12 - and 24 Mbps
Extended Service Set (ESS)
14
802.11g
35. Name two absolute measures of RF power
Unicast
802.11b HR/DSSS and 802.11 DSSS
Watt and mW
Personal mode and Enterprise Mode
36. A brute force attack is limited to breaking___ WEP keys
ARP spoofing
Trojan/Rogue APs - Arp spoofing - DNS spoofing
40 bit
Trojan/Rogue APs
37. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Managed
MAC
DB and dBi
Personal mode and Enterprise Mode
38. The security amendment to the IEEE 802.11 standard requires ____
CCMP
Walled Garden.
Enter a username and password that will be central administered
3
39. As a device moves away from an access point - what is true regarding dynamic rate switching?
Point-to-point link
Interference from a neighboring access point RF denial-of-service (Dos) attack
Data rate increases
Mesh network
40. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
32
2304 bytes
Basic Service Set (BSS)
802.11b
41. 802.11 frames have a maximum 'upper-layer' payload of...
Repeater
HT fixed mode
2304 bytes
SOHO brands that support WPS
42. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Independent
Master
Bridge mode
Trojan/Rogue APs
43. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
HT fixed mode
802.11b HR/DSSS and 802.11 DSSS
Restricts access to authorized users
44. What best describes the Wi-Fi alliance?
Enter a username and password that will be central administered
Interoperability testing organization
Point-to-point link
64-bit - 128-bit
45. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
WPA/WPA2
Semi directional and Highly directional
Height of an RF signal
46. A ______________ does not always use an omnidirectional antenna
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Point-to-point link
Spoof an address
802.11b HR/DSSS and 802.11 DSSS
47. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
Interference from a neighboring access point RF denial-of-service (Dos) attack
DBi
Amplitude and phase
48. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
LTE
1
Wireless Game adapters and Media Bridges
49. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Arp replay
802.11g
SSID (service set identifier)
Three
50. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
Basic Service Set (BSS)
Mesh network
X.509 certificates on the subscriber side only.
25 MHz