SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. A basic service set (BSS) consists of how many access points
WPA2
FHSS
1
1 -6 -11
2. the amplitude of an RF signal is
Height of an RF signal
Active scanning
ISM
802.11n
3. The association process happens after which phase?
Workgroup Bridge mode.
Authentication
40 bit
RTS/CTS
4. The ___ acts as a hub for the WLAN; wireless frame pass through this device
64-bit - 128-bit
Access point
Station (STA)
WPA/WPA2
5. This is typically the 48-bit MAC address of the access point's radio card.
Antenna diversity
BSSID (Basic Service Set identifier)
WEP
Workgroup Bridge mode.
6. Probe requests are used by clients as part of the ____ process
1 - 5.5 and 11 Mbps
Workgroup Bridge mode.
IPSec
Active scanning
7. Aireplay-ng -1
Security
WPA2
Fakeauth
FHSS
8. WiMAX 802.16 authentication is based on...
X.509 certificates on the subscriber side only.
Plaintext
Mesh
RTS/CTS
9. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?
802.11
802.11i
Personal mode and Enterprise Mode
Encryption
10. In a wireless environment '___' refers to a situation in which an unauthenticated user is given access to a limited environment for the purpose of setting up an account or utilizing specific functionality separate from the environment that the rest o
Walled Garden.
LTE
1 -6 -11
Frequency
11. Bluetooth uses a radio technology called
Personal mode and Enterprise Mode
Interference from a neighboring access point RF denial-of-service (Dos) attack
Root mode
FHSS
12. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
Interoperability testing organization
802.11b
802.11
UNII
13. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
Small Office/Home Office Organizations (SOHO)
Captive portal
3
6 -12 - and 24 Mbps
14. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
AES = CCMP required
Independent
802.11n
6 -12 - and 24 Mbps
15. 802.11w can only be used in networks using_____
Active scanning
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
WPA/WPA2
802.11g
16. Collisions are detected through the use of....
802.11g
WPA Enterprise -WEP -MAC filters
Enter a username and password that will be central administered
Acknowledgement frames
17. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
ISM
Two
1 -6 -11
22MHz wide
18. In this mode - the card acts as a normal access point
WEP
A VPN to the office network
Master
Semi directional and Highly directional
19. What type of wireless network device is PIN-based security most commonly used with
Captive portal
Point-to-point link
TKIP - optional RC4
SOHO brands that support WPS
20. When an RF signal bounces off a smooth non absorptive surface - the behavior is
Carefully plan a strategy using WEP and VLANs
Monitor
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Reflection
21. Maximum length of data (Frame body) is 2304 when ____ is not in use
Root mode
Encryption
Dictionary
WPA/WPA2
22. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity
Quality of Service
Single radio AP's
Wireless gateways
Refraction
23. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.
Degradation
Unicast
Authenticate - associate
Captive portal
24. ___ is the topology in which no AP participates - client devices communicate directly to eachother.
TKIP - optional RC4
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
WPA/WPA2
Automatically monitor the network for attacks
25. What is the gain of an antenna measured in
802.11r
OFDM
Watt and mW
DBi
26. Name two relative measures of power
Dual radio APs
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
DB and dBi
ISM
27. A station can act as a routing node in a wireless mesh network
Mesh
Wi-Fi Alliance
Spoof an address
40 bit
28. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Interoperability testing organization
Frequency
1 - 5.5 and 11 Mbps
4 channels
29. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
6 -12 - and 24 Mbps
Obstacles
802.11a
Single radio AP's
30. A basic service set identifier (BSSID) is the MAC address of the ____
Restricts access to authorized users
Authentication
Roaming
AP radio
31. Aireplay-ng -3
Workgroup Bridge mode.
Managed
Mesh
Arp
32. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Management - control - data
Basic Service Set (BSS)
2.4-2.5GHz
Repeater
33. What item has an effect on RF line of site?
TKIP - optional RC4
WEP
WPA2 -WEP
Obstacles
34. Two authentication types defined in the 802.11 standard
Station (STA)
Open system and Shared key
DBi
ARP spoofing
35. Which if the following organizations is responsible for standards compliance?
Basic Service Set (BSS)
Client
Wi-Fi Alliance
MAC
36. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
Ad-Hoc
14
Service sets
ERP protection
37. 4 types of Denial of Service attacks
Greenfield mode
CTS attacks - Deauth attack - Association flood - Jamming
Data rate increases
Active scanning
38. 802.11b is capable of which data rates?
Open system and Shared key
1 - 5.5 and 11 Mbps
Frequency
Encryption
39. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
Passphrase
WPA2 -WEP
802.11b HR/DSSS and 802.11 DSSS
Height of an RF signal
40. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Frequency
PIN
HT 20 MHz protection mode
Secure Layer 3 transmissions over a public network infrastructure
41. Two characteristics of signals are
Dual radio APs
25 MHz
CCMP
Amplitude and phase
42. The capacity of an access point is dependent upon which factors?
Number of users and software applications in use
RC4
Station (STA)
One or more
43. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Passive scan
HT Non member protection mode
Automatically monitor the network for attacks
Management
44. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Captive portal
Active scanning
4 channels
Two
45. High throughput mode 3
WPA 2.0 personal and WPS
Number of users and software applications in use
802.11b
HT fixed mode
46. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
Root mode
802.11i
Amplitude and phase
47. As a device moves away from an access point - what is true regarding dynamic rate switching?
Dual radio APs
SSID and Channel
Data rate increases
Diffraction
48. What type of algorithm does WPA use
Deauth
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Service sets
TKIP - optional RC4
49. A ______________ does not always use an omnidirectional antenna
2304 bytes
Mesh
Point-to-point link
WPA2
50. The security amendment to the IEEE 802.11 standard requires ____
Service sets
Access point
CCMP
Transmitter and receiver