SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
32
Management
Station (STA)
CCMP
2. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Access point
Automatically monitor the network for attacks
Indoor and outdoor
Dual radio APs
3. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Quality of Service
Root mode
Semi directional and Highly directional
Greenfield mode
4. In this mode - the card acts as a normal access point
Restricts access to authorized users
Open system and Shared key
Mesh network
Master
5. As a device moves away from an access point - what is true regarding dynamic rate switching?
SSID and Channel
Data rate increases
Watt and mW
Three
6. Management frames are sent in....
802.11b
ISM
Plaintext
Mesh network
7. 802.11w can only be used in networks using_____
Unicast
WPA/WPA2
Height of an RF signal
SOHO brands that support WPS
8. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Single radio AP's
802.11w
11
Basic Service Set (BSS)
9. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
802.11n
3
Mismatched SSID
Three
10. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Roaming
Repeater
14
Passphrase
11. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Management
Other 802.11a devices
OFDM
Independent
12. 802.11b is capable of which data rates?
CCMP
1 - 5.5 and 11 Mbps
0
Master
13. High Throughput mode 0
Greenfield mode
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Carefully plan a strategy using WEP and VLANs
ERP protection
14. In this mode a station can act as a relay or WLAN range extender
Encryption
Repeater
RC4
3
15. Two characteristics of signals are
One or more
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Amplitude and phase
Unencrypted
16. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Wireless gateways
RTS/CTS
Extended Service Set (ESS)
6 -12 - and 24 Mbps
17. What type of wireless network device is PIN-based security most commonly used with
2.4-2.5GHz
SOHO brands that support WPS
Small Office/Home Office Organizations (SOHO)
A VPN to the office network
18. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
WPA/WPA2
Personal mode and Enterprise Mode
Wireless gateways
19. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Captive portal
40 bit
One or more
802.11g
20. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Reflection
Carefully plan a strategy using WEP and VLANs
UNII
Unencrypted
21. Which security methods do 802.11g access points support?
WPA Enterprise -WEP -MAC filters
802.11i
PIN
Carefully plan a strategy using WEP and VLANs
22. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Addresses wireless Quality of Service
6 -12 - and 24 Mbps
Indoor and outdoor
Frequency
23. WI-Fi Protected Setup was designed for which of the following wireless applications?
Captive portal
Small Office/Home Office Organizations (SOHO)
CTS attacks - Deauth attack - Association flood - Jamming
Transmitter and receiver
24. The ___ acts as a hub for the WLAN; wireless frame pass through this device
Monitor
Access point
Station (STA)
MAC
25. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
Reflection
Brute force - statistical and dictionary
WPA2
802.11n
26. ___ are used to describe the basic components and topology of a WLAN
Unencrypted
ERP-OFDM - DSSS
Service sets
Three
27. an 802.11b 2.4GHz channel is how wide in MHz?
14
HT Non member protection mode
Interference from a neighboring access point RF denial-of-service (Dos) attack
22MHz wide
28. 802.11g LAN operates in what frequency range?
Dynamic Rate switching
Master
Wireless Game adapters and Media Bridges
2.4-2.5GHz
29. This sets the card to participate in an independent basic service set
1 - 5.5 and 11 Mbps
Ad-Hoc
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Secure Layer 3 transmissions over a public network infrastructure
30. What two devices use RF to communicate
Transmitter and receiver
Point-to-point link
802.11b HR/DSSS and 802.11 DSSS
Management - control - data
31. A basic service set (BSS) consists of how many access points
Access point
Data rate increases
Beacons - Probe request - Probe response - Association Request - Reassociation Request
1
32. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Data rate increases
Mismatched SSID
802.11n
Passphrase
33. This type of MITM attack involves sending fake or spoofed ARP responses on a LAN to the victim and or gateway
BSSID (Basic Service Set identifier)
Quality of Service
CCMP
ARP spoofing
34. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
Data rate increases
OFDM
Active mode
Captive portal
35. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
40 bit
WPA2 -WEP
Master
Mesh network
36. Aireplay-ng -1
Fakeauth
Transmitter and receiver
64-bit - 128-bit
Authentication
37. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks
802.11r
Walled Garden.
Mesh
RTS/CTS
38. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
Unencrypted
802.11n
7
WPA 2.0 personal and WPS
39. A ______________ does not always use an omnidirectional antenna
Passphrase
Security
Service sets
Point-to-point link
40. Point to Point links typically use which antenna types?
Data rate increases
Semi directional and Highly directional
Authentication
802.11g
41. What type of algorithm does WPA use
ISM
Brute force - statistical and dictionary
Repeater
TKIP - optional RC4
42. When RF passes or bends around an obstacle such as a building or column - the behavior is
Personal mode and Enterprise Mode
11
Basic Service Set (BSS)
Diffraction
43. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Frequency
Service sets
Root mode
Passphrase
44. The association process happens after which phase?
Small Office/Home Office Organizations (SOHO)
Point-to-point link
0
Authentication
45. Three types of MITM attacks
Height of an RF signal
Trojan/Rogue APs - Arp spoofing - DNS spoofing
AP radio
Mesh network
46. A service set identifier (SSID) has a maximum limit of how many characters?
Two
32
802.11r
40 bit
47. High throughput mode 2
DB and dBi
HT 20 MHz protection mode
Refraction
FHSS
48. Which process is a VPN solution intended to provide for users connection to a network
Two
Independent
Roaming
Secure Layer 3 transmissions over a public network infrastructure
49. Which function does RBAC provide?
Restricts access to authorized users
BSSID (Basic Service Set identifier)
Access point
Wi-Fi Alliance
50. WPA was developed as an interim solution for which amendment to the 802.11 standards?
802.11i
Open system
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
One or more