SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The ___ acts as a hub for the WLAN; wireless frame pass through this device
WPA 2.0 personal and WPS
Interference from a neighboring access point RF denial-of-service (Dos) attack
Access point
Other 802.11a devices
2. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
1 -6 -11
Access point
2.4-2.5GHz
802.11
3. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Basic Service Set (BSS)
Frequency
Repeater
Brute force - statistical and dictionary
4. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
WPA 2.0 personal and WPS
Wireless gateways
A VPN to the office network
Passive scan
5. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
Transmitter and receiver
Open system
Unencrypted
6. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network
Know the SSID and enter it manually
Height of an RF signal
Authentication
Master
7. This is typically the 48-bit MAC address of the access point's radio card.
Active scanning
HT fixed mode
BSSID (Basic Service Set identifier)
Repeater
8. An independent basic service set (IBSS) consists of how many access points?
WPA Enterprise -WEP -MAC filters
0
Enter a username and password that will be central administered
Ad-Hoc
9. ____ is also known as the Protected management frame standard
802.11w
Access point
Amplitude and phase
Repeater
10. Bluetooth uses a radio technology called
Reflection
Passphrase
RTS/CTS
FHSS
11. This is the default mode that sets the card as a client that could then connect to an AP
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
1 - 5.5 and 11 Mbps
Managed
32
12. A station can act as a routing node in a wireless mesh network
Passive scan
Mesh
Height of an RF signal
802.11g
13. In order to set up an ad hoc network a user must know which two parameters?
Interference from a neighboring access point RF denial-of-service (Dos) attack
Greenfield mode
SSID and Channel
802.11w
14. Two authentication types defined in the 802.11 standard
Dictionary
Three
Open system and Shared key
Independent
15. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Indoor and outdoor
Authenticate - associate
IPSec
Fake auth
16. Which function does RBAC provide?
SSID (service set identifier)
Restricts access to authorized users
CTS attacks - Deauth attack - Association flood - Jamming
IPSec
17. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
CCMP
Monitor
40 bit
Open system
18. Aireplay-ng -3
Arp
Degradation
UNII
2.4-2.5GHz
19. You are a technical support engineer and receive a call from a customer regarding a problem with their network connection. The building has an ESS network with five 802.11g access points. The customer claims that when they move from their office to a
Station (STA)
802.11
Addresses wireless Quality of Service
Mismatched SSID
20. 4 types of Denial of Service attacks
CTS attacks - Deauth attack - Association flood - Jamming
Fake auth
Arp
Arp replay
21. The 802.11g standard uses which two speed spectrum technologies.
Two
Transmitter and receiver
ERP-OFDM - DSSS
CCMP
22. A ______________ does not always use an omnidirectional antenna
TKIP - optional RC4
Point-to-point link
Dictionary
Arp replay
23. 802.11 uses CSMA/...
Roaming
PIN
A VPN to the office network
CA - Collision avoidance
24. What kind of Algorithm does WPA2 use?
Secure Layer 3 transmissions over a public network infrastructure
Small Office/Home Office Organizations (SOHO)
Other 802.11a devices
AES = CCMP required
25. A pre-shared key mode may be vulnerable to a ____ attack
DBi
Unencrypted
Independent
Dictionary
26. ___ are used to describe the basic components and topology of a WLAN
WPA Enterprise -WEP -MAC filters
Enter a username and password that will be central administered
802.11b HR/DSSS and 802.11 DSSS
Service sets
27. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
7
UNII
25 MHz
28. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
Repeater
BSSID (Basic Service Set identifier)
MAC
Station (STA)
29. Which process is a VPN solution intended to provide for users connection to a network
Secure Layer 3 transmissions over a public network infrastructure
Open system
FHSS
SSID (service set identifier)
30. When RF passes or bends around an obstacle such as a building or column - the behavior is
Diffraction
Amplitude and phase
Small Office/Home Office Organizations (SOHO)
Repeater
31. This type of authentication is essentially 'Null authentication'
Degradation
Root mode
Open system
AP radio
32. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
14
Extended Service Set (ESS)
Diffraction
Wi-Fi Alliance
33. A basic service set identifier (BSSID) is the MAC address of the ____
Unencrypted
RC4
HT fixed mode
AP radio
34. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
CCMP
Other 802.11a devices
ARP spoofing
ERP protection
35. Aireplay-ng -1
MAC
Small Office/Home Office Organizations (SOHO)
Fakeauth
802.11g
36. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
802.11w
Enter a username and password that will be central administered
Access point
37. What type of certification came from 802.11i
WPA2
Monitor
WPA 2.0 personal and WPS
BSSID (Basic Service Set identifier)
38. Both ___ and ___ are wireless LAN security methods that support shared key security.
1 -6 -11
WPA2 -WEP
4 channels
FHSS
39. 802.11b is capable of which data rates?
3
ERP-OFDM - DSSS
1 - 5.5 and 11 Mbps
WEP
40. WiMAX 802.16 authentication is based on...
Height of an RF signal
Interference from a neighboring access point RF denial-of-service (Dos) attack
X.509 certificates on the subscriber side only.
Wi-Fi Alliance
41. As a device moves away from an access point - what is true regarding dynamic rate switching?
Mismatched SSID
Data rate increases
X.509 certificates on the subscriber side only.
Restricts access to authorized users
42. 3 types of frames
Management - control - data
OFDM
Height of an RF signal
Spoof an address
43. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.
Trojan/Rogue APs
4 channels
Active scanning
Dual radio APs
44. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Ad-Hoc
SOHO brands that support WPS
Dynamic Rate switching
Management
45. The length of a WEP key is typically ___ or ___
Height of an RF signal
Arp replay
64-bit - 128-bit
DBi
46. According to the 802.11a amendment - which data rates are mandatory?
Refraction
6 -12 - and 24 Mbps
11
Beacons - Probe request - Probe response - Association Request - Reassociation Request
47. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
Active mode
802.11a
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Independent
48. What type of algorithm does WPA use
Repeater
TKIP - optional RC4
Bridge mode
Addresses wireless Quality of Service
49. Maximum length of data (Frame body) is 2304 when ____ is not in use
Quality of Service
WPA Enterprise -WEP -MAC filters
Encryption
ERP protection
50. Which data encryption.authentication method is identified in the IEEE 802.11 standard
WEP
Security
SSID and Channel
Bridge mode