SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A newly configured wireless intrusion prevention system will___
Transmitter and receiver
OFDM
Independent
Automatically monitor the network for attacks
2. High Throughput mode 0
2304 bytes
1
802.11w
Greenfield mode
3. Bluetooth uses a radio technology called
Roaming
FHSS
Small Office/Home Office Organizations (SOHO)
Amplitude and phase
4. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Carefully plan a strategy using WEP and VLANs
Degradation
802.11i
Basic Service Set (BSS)
5. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Reflection
LTE
Repeater
HT Non member protection mode
6. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
802.11
Service sets
DB and dBi
25 MHz
7. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
RC4
ARP spoofing
Two
Carefully plan a strategy using WEP and VLANs
8. Name two relative measures of power
CCMP
Captive portal
Number of users and software applications in use
DB and dBi
9. 4 types of Denial of Service attacks
Enter a username and password that will be central administered
Repeater
OFDM
CTS attacks - Deauth attack - Association flood - Jamming
10. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
SSID and Channel
4 channels
Passve Scanning
Repeater
11. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Number of users and software applications in use
Dictionary
40 bit
Enter a username and password that will be central administered
12. What is the gain of an antenna measured in
Authenticate - associate
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
DBi
Degradation
13. Which items are unique to a service set identifier
Management
Client
802.11
32 character maximum and is case sensitive
14. A service set identifier (SSID) has a maximum limit of how many characters?
32
ISM
Captive portal
WPA Enterprise -WEP -MAC filters
15. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
802.11i
802.11w
MAC
OFDM
16. In bluetooth - one master may communicate with up to ___ slaves in a piconet
7
Wireless Game adapters and Media Bridges
Active mode
X.509 certificates on the subscriber side only.
17. ____ is also known as the Protected management frame standard
Management - control - data
Passphrase
Semi directional and Highly directional
802.11w
18. These types of attacks are used to generate fake associated clients on an AP in order to enable injection attacks through the AP
WPA 2.0 personal and WPS
Fake auth
Watt and mW
Roaming
19. ___ are used to describe the basic components and topology of a WLAN
Dual radio APs
Open system and Shared key
SOHO brands that support WPS
Service sets
20. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Single radio AP's
Repeater
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Wavelength
21. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Passphrase
UNII
Dynamic Rate switching
22. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Arp replay
802.11g
802.11n
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
23. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Master
Beacons - Probe request - Probe response - Association Request - Reassociation Request
WPA 2.0 personal and WPS
Acknowledgement frames
24. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Passive scan
Point-to-point link
Mismatched SSID
Access point
25. What two devices use RF to communicate
Unencrypted
Acknowledgement frames
Transmitter and receiver
802.11n
26. 802.11 frames have a maximum 'upper-layer' payload of...
Dual radio APs
ISM
2304 bytes
Basic Service Set (BSS)
27. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
SOHO brands that support WPS
Wavelength
Wireless gateways
RC4
28. When an RF signal bounces off a smooth non absorptive surface - the behavior is
1 - 5.5 and 11 Mbps
Reflection
ERP protection
Bridge mode
29. Aireplay-ng -1
25 MHz
802.11g
Watt and mW
Fakeauth
30. What type of wireless network device is PIN-based security most commonly used with
Arp replay
SOHO brands that support WPS
LTE
A VPN to the office network
31. In this mode - the card acts as a normal access point
Active mode
Master
14
Service sets
32. 802.11 uses CSMA/...
CA - Collision avoidance
IPSec
TKIP - optional RC4
Dual radio APs
33. Layer 2 Tunneling Protocol commonly uses which encryption method?
802.11
Wi-Fi Alliance
Passve Scanning
IPSec
34. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
WPA 2.0 personal and WPS
Carefully plan a strategy using WEP and VLANs
14
Trojan/Rogue APs
35. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
1 - 5.5 and 11 Mbps
Station (STA)
Monitor
Spoof an address
36. An Ack is expected for every____ frame transmitted
Plaintext
AES = CCMP required
Client
Unicast
37. In order to set up an ad hoc network a user must know which two parameters?
1
802.11g
WPA2
SSID and Channel
38. An independent basic service set (IBSS) consists of how many access points?
BSSID (Basic Service Set identifier)
Spoof an address
Root mode
0
39. A weakness with MAC filtering is that it allows an intruder to ____
HT fixed mode
Interoperability testing organization
Know the SSID and enter it manually
Spoof an address
40. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Beacons - Probe request - Probe response - Association Request - Reassociation Request
BSSID (Basic Service Set identifier)
PIN
802.11b HR/DSSS and 802.11 DSSS
41. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath
3
DBi
WPA 2.0 personal and WPS
Antenna diversity
42. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
WPA/WPA2
802.11b HR/DSSS and 802.11 DSSS
Roaming
Arp replay
43. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Authenticate - associate
Degradation
Enter a username and password that will be central administered
Data rate increases
44. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
45. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
FHSS
Unencrypted
32
ERP protection
46. In this mode a station can act as a relay or WLAN range extender
Repeater
ERP-OFDM - DSSS
Master
Passve Scanning
47. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
802.11b
RTS/CTS
Workgroup Bridge mode.
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
48. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Management - control - data
802.11b
Dual radio APs
Know the SSID and enter it manually
49. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Carefully plan a strategy using WEP and VLANs
802.11
Antenna diversity
50. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
11
Monitor
A VPN to the office network
Personal mode and Enterprise Mode