Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






2. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






3. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






4. The extra overhead of RTS/CTS will cause a ___________ of maximum throughput on the network.






5. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.






6. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis






7. The association process happens after which phase?






8. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






9. ____ is one way to reduce the effects of multipath. Is is a technology used in wireless LANs where a station will utilize two antennas combined with one radio to decrease the effects of multipath






10. In bluetooth - one master may communicate with up to ___ slaves in a piconet






11. WPA was developed as an interim solution for which amendment to the 802.11 standards?






12. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






13. What is regarded in 802.11e?






14. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






15. ____ is also known as the Protected management frame standard






16. Which security feature provides the strongest security for a home-based wireless network?






17. This is typically the 48-bit MAC address of the access point's radio card.






18. 802.11w can only be used in networks using_____






19. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS






20. This sets the card to participate in an independent basic service set






21. 3 types of frames






22. Name two relative measures of power






23. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.






24. The capacity of an access point is dependent upon which factors?






25. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s






26. Three types of MITM attacks






27. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'






28. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






29. What two devices use RF to communicate






30. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure






31. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






32. in the 2.4GHz range - what distance between the center frequencies is required for two channels to be considered non-overlapping for HR/DSSS






33. Aireplay-ng -0






34. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


35. Management frames are sent in....






36. What best describes the Wi-Fi alliance?






37. 5.0 GHz - Ch 36 and up - Non overlapping - 23 total channels






38. An Ack is expected for every____ frame transmitted






39. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...






40. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






41. ____ is the wireless amendment that specifies how to conduct seamless handoffs.






42. 802.11 uses CSMA/...






43. Name two absolute measures of RF power






44. 802.11g LAN operates in what frequency range?






45. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?






46. Three types of passive WEP attacks






47. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W






48. Both ___ and ___ are wireless LAN security methods that support shared key security.






49. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






50. A weakness with MAC filtering is that it allows an intruder to ____