SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What organization is responsible for unlicensed frequency band regulations in the United States?
FCC
Roaming
ERP-OFDM - DSSS
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
2. 3 types of antennas
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Indoor and outdoor
25 MHz
3. The length of a WEP key is typically ___ or ___
Brute force - statistical and dictionary
64-bit - 128-bit
Fakeauth
BSSID (Basic Service Set identifier)
4. Three types of MITM attacks
Number of users and software applications in use
Trojan/Rogue APs - Arp spoofing - DNS spoofing
MAC
A VPN to the office network
5. Two authentication types defined in the 802.11 standard
Open system and Shared key
11
Small Office/Home Office Organizations (SOHO)
Deauth
6. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183
7. Management frames are sent in....
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Arp
Plaintext
Arp replay
8. What best describes the Wi-Fi alliance?
WPA 2.0 personal and WPS
Plaintext
WPA Enterprise -WEP -MAC filters
Interoperability testing organization
9. A ______________ does not always use an omnidirectional antenna
Quality of Service
40 bit
Degradation
Point-to-point link
10. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
PIN
Dynamic Rate switching
Client
Master
11. Which process is a VPN solution intended to provide for users connection to a network
2304 bytes
Secure Layer 3 transmissions over a public network infrastructure
WPA Enterprise -WEP -MAC filters
Plaintext
12. In this mode - the card acts as a normal access point
Monitor
Personal mode and Enterprise Mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Master
13. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
Two
802.11b
UNII
ERP-OFDM - DSSS
14. Typically a point-to-multipoint link consists of ____ connections
ERP protection
AP radio
Three
Spoof an address
15. The 802.11i amendment to the standard addresses which of the following technologies?
Obstacles
Security
32
DB and dBi
16. Layer 2 Tunneling Protocol commonly uses which encryption method?
802.11w
IPSec
Wi-Fi Alliance
2304 bytes
17. High Throughput mode 0
Indoor and outdoor
Greenfield mode
Basic Service Set (BSS)
HT 20 MHz protection mode
18. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Encryption
Arp replay
Degradation
Beacons - Probe request - Probe response - Association Request - Reassociation Request
19. The IEEE 802.1X standard identifies the authenticator as another term for the ___ in wireless networking
HT 20 MHz protection mode
AP to AP
Acknowledgement frames
Access point
20. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
2304 bytes
LTE
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Height of an RF signal
21. Point to Point links typically use which antenna types?
Dictionary
Root mode
Unencrypted
Semi directional and Highly directional
22. Aireplay-ng -0
Deauth
Transmitter and receiver
Enter a username and password that will be central administered
7
23. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Open system and Shared key
Interoperability testing organization
Indoor and outdoor
32 character maximum and is case sensitive
24. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Authenticate - associate
PIN
Client
Mesh
25. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
40 bit
Independent
Basic Service Set (BSS)
Passive scan
26. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
40 bit
0
Frequency
Independent
27. Probe requests are used by clients as part of the ____ process
1
Wireless Game adapters and Media Bridges
Encryption
Active scanning
28. Which if the following organizations is responsible for standards compliance?
Frequency
Ad-Hoc
802.11b HR/DSSS and 802.11 DSSS
Wi-Fi Alliance
29. 802.11w can only be used in networks using_____
Data rate increases
A VPN to the office network
WPA/WPA2
0
30. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS
25 MHz
HT Non member protection mode
CCMP
1
31. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
32
802.11g
Arp
32. Aireplay-ng -3
Restricts access to authorized users
1 -6 -11
Arp
Addresses wireless Quality of Service
33. High Throughput mode 1
X.509 certificates on the subscriber side only.
Captive portal
HT Non member protection mode
Encryption
34. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Addresses wireless Quality of Service
14
Frequency
Dual radio APs
35. Give two examples of WGB devices.
Mesh
Wireless Game adapters and Media Bridges
Wavelength
Captive portal
36. The Layer 2 frame will be...
Authenticate - associate
Deauth
Unencrypted
6 -12 - and 24 Mbps
37. Collisions are detected through the use of....
Acknowledgement frames
HT 20 MHz protection mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Quality of Service
38. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Deauth
Wavelength
Height of an RF signal
HT fixed mode
39. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Dual radio APs
Independent
802.11b HR/DSSS and 802.11 DSSS
Repeater
40. Wireless LAN devices in an 802.11a peer-to-peer network will connect to which devices?
Other 802.11a devices
Security
Service sets
WPA 2.0 personal and WPS
41. 802.11 frames have a maximum 'upper-layer' payload of...
AP to AP
2304 bytes
Antenna diversity
1 - 5.5 and 11 Mbps
42. This is the default mode that sets the card as a client that could then connect to an AP
Managed
Obstacles
Unicast
Dictionary
43. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
Extended Service Set (ESS)
Carefully plan a strategy using WEP and VLANs
Basic Service Set (BSS)
SSID (service set identifier)
44. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
Mesh network
PIN
802.11r
Arp replay
45. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
1 -6 -11
Diffraction
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Captive portal
46. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Bridge mode
Antenna diversity
WPA Enterprise -WEP -MAC filters
Workgroup Bridge mode.
47. What algorithm does WEP use
WEP
DB and dBi
RC4
WPA/WPA2
48. As a device moves away from an access point - what is true regarding dynamic rate switching?
ERP-OFDM - DSSS
Data rate increases
Greenfield mode
Encryption
49. the amplitude of an RF signal is
Height of an RF signal
0
Diffraction
SOHO brands that support WPS
50. A newly configured wireless intrusion prevention system will___
Independent
Active mode
Automatically monitor the network for attacks
HT Non member protection mode