Test your basic knowledge |

Wireless Technology Specialist

Subject : it-skills
Instructions:
  • Answer 50 questions in 15 minutes.
  • If you are not ready to take this test, you can study here.
  • Match each statement with the correct term.
  • Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.

This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. What is regarded in 802.11e?






2. According to the 802.11a amendment - which data rates are mandatory?






3. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS






4. WiMAX 802.16 authentication is based on...






5. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.






6. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?






7. What item has an effect on RF line of site?






8. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point






9. A basic service set identifier (BSSID) is the MAC address of the ____






10. Name 3 channels considered non overlapping in the 2.4GHZ band






11. A weakness with MAC filtering is that it allows an intruder to ____






12. Management frames are sent in....






13. Maximum length of data (Frame body) is 2304 when ____ is not in use






14. The security amendment to the IEEE 802.11 standard requires ____






15. Both ___ and ___ are wireless LAN security methods that support shared key security.






16. Layer 2 Tunneling Protocol commonly uses which encryption method?






17. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?






18. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?






19. What is addressed by the Wi-Fi Multimedia (WMM) certifications?






20. _____ are multifunctional devices which are combined with an AP to provide wireless connectivity






21. An Ack is expected for every____ frame transmitted






22. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device






23. 3 types of frames






24. What type of certification came from 802.11i






25. _____ can support client connections on one radio channel and the DS connection on a non-competing channel.






26. Collisions are detected through the use of....






27. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.






28. Aireplay-ng -1






29. Which two options are for Wi-Fi Protected Access 2 (WPA 2.0)?






30. the amplitude of an RF signal is






31. This is implemented in networks to minimize the effects of excessive collisions in mixed 802.11b and 802.11g networks






32. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput

Warning: Invalid argument supplied for foreach() in /var/www/html/basicversity.com/show_quiz.php on line 183


33. 4 types of Denial of Service attacks






34. This is typically the 48-bit MAC address of the access point's radio card.






35. Which items are unique to a service set identifier






36. Which security methods do 802.11g access points support?






37. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11






38. When a wireless LAN device listens for beacon frames - it is participating in which phase?






39. 802.11a uses which spread spectrum technology?






40. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?






41. Hiding the service set identifier of a wireless LAN will require a user to ____ in order to gain access to the wireless network






42. What algorithm does WEP use






43. As a device moves away from an access point - what is true regarding dynamic rate switching?






44. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?






45. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?






46. ___ are used to describe the basic components and topology of a WLAN






47. Three types of passive WEP attacks






48. What kind of Algorithm does WPA2 use?






49. The Layer 2 frame will be...






50. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I