SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Transmitter and receiver
Basic Service Set (BSS)
BSSID (Basic Service Set identifier)
2. 802.11w can only be used in networks using_____
32 character maximum and is case sensitive
HT fixed mode
Interoperability testing organization
WPA/WPA2
3. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
802.11b
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Bridge mode
1 -6 -11
4. Aireplay-ng -3
6 -12 - and 24 Mbps
Arp
ERP-OFDM - DSSS
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
5. An Ack is expected for every____ frame transmitted
32 character maximum and is case sensitive
Quality of Service
Unicast
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
6. ___ are used to describe the basic components and topology of a WLAN
Service sets
Know the SSID and enter it manually
Workgroup Bridge mode.
Interference from a neighboring access point RF denial-of-service (Dos) attack
7. Three types of MITM attacks
64-bit - 128-bit
Management
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Frequency
8. What organization is responsible for unlicensed frequency band regulations in the United States?
Deauth
FCC
Open system
WPA Enterprise -WEP -MAC filters
9. The 802.11i amendment to the standard addresses which of the following technologies?
Security
Repeater
WPA2
Passive scan
10. Which security feature provides the strongest security for a home-based wireless network?
Passphrase
Mesh network
Fakeauth
2.4-2.5GHz
11. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Single radio AP's
802.11
Diffraction
802.11g
12. This is a topology in which two or more APs are connected by a common distribution system.
Spoof an address
OFDM
Extended Service Set (ESS)
Management
13. WiMAX 802.16 authentication is based on...
Deauth
X.509 certificates on the subscriber side only.
Personal mode and Enterprise Mode
RTS/CTS
14. The process in which a wireless LAN clients connection moves from one access point to another is called ______
802.11
Deauth
Roaming
Arp
15. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
UNII
PIN
HT fixed mode
16. Management frames are sent in....
Plaintext
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Addresses wireless Quality of Service
RTS/CTS
17. WPA was developed as an interim solution for which amendment to the 802.11 standards?
Mesh
802.11i
ERP-OFDM - DSSS
Number of users and software applications in use
18. A ______________ does not always use an omnidirectional antenna
Point-to-point link
32 character maximum and is case sensitive
Encryption
Obstacles
19. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
SSID and Channel
Mesh network
DBi
Obstacles
20. A pre-shared key mode may be vulnerable to a ____ attack
CA - Collision avoidance
Dictionary
Personal mode and Enterprise Mode
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
21. What protocol am I? - 2.5/5 GHz Data rate - 248 Mbps - OFDM/MIMO
802.11n
Active scanning
802.11w
HT fixed mode
22. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
HT 20 MHz protection mode
Personal mode and Enterprise Mode
40 bit
OFDM
23. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
IPSec
WPA Enterprise -WEP -MAC filters
802.11b HR/DSSS and 802.11 DSSS
1
24. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
Quality of Service
802.11a
Monitor
25. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Arp
HT Non member protection mode
Active mode
Monitor
26. 3 types of antennas
Dynamic Rate switching
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Interoperability testing organization
Passive scan
27. 3 types of frames
Management - control - data
Personal mode and Enterprise Mode
CTS attacks - Deauth attack - Association flood - Jamming
RC4
28. According to the 802.11a amendment - which data rates are mandatory?
Captive portal
A VPN to the office network
Quality of Service
6 -12 - and 24 Mbps
29. In order to set up an ad hoc network a user must know which two parameters?
Deauth
SSID and Channel
DBi
AES = CCMP required
30. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Wavelength
WPA/WPA2
HT 20 MHz protection mode
FCC
31. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
RC4
ARP spoofing
Mesh network
32. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
64-bit - 128-bit
Mesh network
Security
Active mode
33. What is regarded in 802.11e?
Addresses wireless Quality of Service
Client
Passve Scanning
ARP spoofing
34. Probe requests are used by clients as part of the ____ process
Active scanning
22MHz wide
Wi-Fi Alliance
Wireless gateways
35. What is addressed by the Wi-Fi Multimedia (WMM) certifications?
Quality of Service
22MHz wide
1 -6 -11
Repeater
36. A brute force attack is limited to breaking___ WEP keys
PIN
40 bit
CA - Collision avoidance
Point-to-point link
37. 802.11b is capable of which data rates?
Access point
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
1 - 5.5 and 11 Mbps
Automatically monitor the network for attacks
38. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
OFDM
14
Workgroup Bridge mode.
Management - control - data
39. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
UNII
Automatically monitor the network for attacks
Personal mode and Enterprise Mode
Secure Layer 3 transmissions over a public network infrastructure
40. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Management - control - data
802.11r
Arp
CA - Collision avoidance
41. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
MAC
Authenticate - associate
Wireless gateways
UNII
42. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
HT fixed mode
7
Management
Reflection
43. A basic service set identifier (BSSID) is the MAC address of the ____
7
Interoperability testing organization
AP radio
Diffraction
44. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Authentication
Root mode
Arp replay
Ad-Hoc
45. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Access point
Fake auth
SSID (service set identifier)
Trojan/Rogue APs
46. A weakness with MAC filtering is that it allows an intruder to ____
Spoof an address
SOHO brands that support WPS
WEP
Deauth
47. What type of algorithm does WPA use
SSID and Channel
TKIP - optional RC4
BSSID (Basic Service Set identifier)
Authenticate - associate
48. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Access point
SSID (service set identifier)
FHSS
ERP-OFDM - DSSS
49. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
RTS/CTS
Open system
802.11a
50. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Wi-Fi Alliance
802.11g
WPA2 -WEP