SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
X.509 certificates on the subscriber side only.
Client
Acknowledgement frames
2. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Greenfield mode
802.11b HR/DSSS and 802.11 DSSS
Enter a username and password that will be central administered
AES = CCMP required
3. What type of wireless network device is PIN-based security most commonly used with
7
SOHO brands that support WPS
Three
DB and dBi
4. This is the default mode that sets the card as a client that could then connect to an AP
Two
A VPN to the office network
Indoor and outdoor
Managed
5. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Spoof an address
Bridge mode
2.4-2.5GHz
Wavelength
6. An Ack is expected for every____ frame transmitted
Unicast
PIN
WPA 2.0 personal and WPS
ERP-OFDM - DSSS
7. What type of certification came from 802.11i
Bridge mode
RC4
WPA2
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
8. The open system authentication process uses how many frames?
X.509 certificates on the subscriber side only.
Greenfield mode
Managed
Two
9. Give two examples of WGB devices.
Interference from a neighboring access point RF denial-of-service (Dos) attack
Degradation
Wireless Game adapters and Media Bridges
Management
10. In this mode - the card acts as a normal access point
Master
3
Height of an RF signal
SOHO brands that support WPS
11. 802.11w can only be used in networks using_____
Basic Service Set (BSS)
Client
WPA/WPA2
Watt and mW
12. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Passve Scanning
ERP protection
Access point
Spoof an address
13. As a device moves away from an access point - what is true regarding dynamic rate switching?
Data rate increases
Wireless gateways
32
Trojan/Rogue APs
14. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Station (STA)
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Open system
14
15. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Degradation
7
Carefully plan a strategy using WEP and VLANs
Bridge mode
16. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
Unicast
RC4
ERP-OFDM - DSSS
17. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Dictionary
802.11b HR/DSSS and 802.11 DSSS
Service sets
Interoperability testing organization
18. WiMAX 802.16 authentication is based on...
Other 802.11a devices
Security
1
X.509 certificates on the subscriber side only.
19. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
RTS/CTS
AP to AP
1
20. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
Restricts access to authorized users
SOHO brands that support WPS
Captive portal
Access point
21. the amplitude of an RF signal is
Three
Height of an RF signal
Watt and mW
Quality of Service
22. Wireless gateways come in two primary forms...
FCC
Frequency
WEP
Residential and Enterprise
23. What is regarded in 802.11e?
Active mode
802.11b
Addresses wireless Quality of Service
Repeater
24. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
Number of users and software applications in use
802.11
Client
2.4-2.5GHz
25. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
802.11
AP radio
802.11n
26. Aireplay-ng -3
802.11w
Arp
Obstacles
DB and dBi
27. This sets the card to participate in an independent basic service set
WPA/WPA2
802.11
Reflection
Ad-Hoc
28. This type of authentication is essentially 'Null authentication'
802.11
6 -12 - and 24 Mbps
Open system
CCMP
29. What is the gain of an antenna measured in
DBi
Arp replay
Bridge mode
4 channels
30. Which items are unique to a service set identifier
ERP-OFDM - DSSS
Repeater
32 character maximum and is case sensitive
Repeater
31. Layer 2 Tunneling Protocol commonly uses which encryption method?
Dual radio APs
Repeater
IPSec
Extended Service Set (ESS)
32. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11n
RC4
Watt and mW
A VPN to the office network
33. ____ is also known as the Protected management frame standard
Passive scan
Greenfield mode
Dual radio APs
802.11w
34. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
Single radio AP's
802.11r
Personal mode and Enterprise Mode
Point-to-point link
35. What kind of Algorithm does WPA2 use?
ARP spoofing
Service sets
AES = CCMP required
Reflection
36. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
CA - Collision avoidance
Arp
Captive portal
37. A station can act as a routing node in a wireless mesh network
802.11w
Spoof an address
Mesh
Dictionary
38. an 802.11b 2.4GHz channel is how wide in MHz?
Semi directional and Highly directional
14
RTS/CTS
22MHz wide
39. High throughput mode 2
ERP protection
Roaming
HT 20 MHz protection mode
LTE
40. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
BSSID (Basic Service Set identifier)
802.11r
SSID (service set identifier)
Mesh
41. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
2304 bytes
2.4-2.5GHz
Service sets
PIN
42. A ______________ does not always use an omnidirectional antenna
Access point
Point-to-point link
Refraction
UNII
43. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
2304 bytes
ISM
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Carefully plan a strategy using WEP and VLANs
44. What two devices use RF to communicate
WPA2 -WEP
Transmitter and receiver
Monitor
Single radio AP's
45. The Layer 2 frame will be...
HT Non member protection mode
Unencrypted
Amplitude and phase
Wireless gateways
46. Two characteristics of signals are
Interoperability testing organization
UNII
Amplitude and phase
Wavelength
47. Bluetooth uses a radio technology called
Active mode
802.11g
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
FHSS
48. Probe requests are used by clients as part of the ____ process
Interoperability testing organization
64-bit - 128-bit
Active scanning
WPA2
49. The process in which a wireless LAN clients connection moves from one access point to another is called ______
DB and dBi
Roaming
Number of users and software applications in use
Open system
50. 4 types of Denial of Service attacks
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Small Office/Home Office Organizations (SOHO)
CTS attacks - Deauth attack - Association flood - Jamming
22MHz wide