SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This mode provides wireless connectivity between two or more wired networks. It may be configured as Point-to-point or point-to-multipoint. Links and operates as either a root bridge or non-root bridge.
Brute force - statistical and dictionary
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Bridge mode
2. The main component of an 802.11 wireless network is the radio card (NIC) - which is referred to by the 802.11 standards as a...
802.11n
Root mode
Station (STA)
Deauth
3. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Service sets
IPSec
Encryption
Passve Scanning
4. This if often found at cyber cafes. It forces an HTTP client on a network to see a special web page for authentication before using the internet normally.
3
Captive portal
Arp
32
5. ___ mode provides a wireless 'upstream' connection for wireless clients - and is also known as a 'range extender'.
Repeater
Mesh
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
Frequency
6. Name two relative measures of power
Authenticate - associate
Data rate increases
DB and dBi
OFDM
7. High throughput mode 3
HT fixed mode
Beacons - Probe request - Probe response - Association Request - Reassociation Request
HT 20 MHz protection mode
LTE
8. Aireplay-ng -3
Captive portal
Arp
Unencrypted
Automatically monitor the network for attacks
9. What protocol am I? - 2.4GHz Freq - 2 Mbps Data Rate - DSSS/FHSSS
WPA2 -WEP
Know the SSID and enter it manually
802.11
Two
10. Name 3 channels considered non overlapping in the 2.4GHZ band
25 MHz
AP radio
802.11n
1 -6 -11
11. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Refraction
802.11a
802.11g
Interoperability testing organization
12. An Ack is expected for every____ frame transmitted
Access point
Unicast
Spoof an address
Mesh network
13. In bluetooth - one master may communicate with up to ___ slaves in a piconet
Authenticate - associate
UNII
Trojan/Rogue APs
7
14. 802.11w can only be used in networks using_____
WPA/WPA2
14
64-bit - 128-bit
DBi
15. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Secure Layer 3 transmissions over a public network infrastructure
Greenfield mode
1 -6 -11
PIN
16. A weakness with MAC filtering is that it allows an intruder to ____
Diffraction
Interoperability testing organization
Point-to-point link
Spoof an address
17. Which data encryption.authentication method is identified in the IEEE 802.11 standard
HT Non member protection mode
Mismatched SSID
WPA2 -WEP
WEP
18. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Bridge mode
Trojan/Rogue APs
Roaming
802.11w
19. Three types of passive WEP attacks
Basic Service Set (BSS)
Trojan/Rogue APs - Arp spoofing - DNS spoofing
Brute force - statistical and dictionary
Client
20. High Throughput mode 0
Semi directional and Highly directional
Greenfield mode
Personal mode and Enterprise Mode
FCC
21. a ___ filter is used to allow or deny wireless barcode scanners access to an 802.11b/g network.
MAC
Three
1
Station (STA)
22. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
Arp replay
LTE
Wireless gateways
Fakeauth
23. The Access point can operate in a variety of modes...
Dual radio APs
Basic Service Set (BSS)
Mismatched SSID
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
24. What algorithm does WEP use
WPA2 -WEP
RC4
WPA2
WPA 2.0 personal and WPS
25. Typically a point-to-multipoint link consists of ____ connections
Three
Know the SSID and enter it manually
IPSec
One or more
26. The length of a WEP key is typically ___ or ___
64-bit - 128-bit
Client
Fakeauth
HT Non member protection mode
27. ____ provides wireless access to a group of wired stations 'behind' the bridge. It aggregates multiple wired clients into one collective wireless client known as a 'Client bridge'
Workgroup Bridge mode.
Semi directional and Highly directional
Client
Other 802.11a devices
28. Probe requests are used by clients as part of the ____ process
ERP protection
ERP-OFDM - DSSS
Active scanning
Indoor and outdoor
29. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
TKIP - optional RC4
Diffraction
Open system
802.11b
30. According to the 802.11a amendment - which data rates are mandatory?
HT fixed mode
Bridge mode
One or more
6 -12 - and 24 Mbps
31. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
HT Non member protection mode
Client
SSID (service set identifier)
1 - 5.5 and 11 Mbps
32. 802.11 uses CSMA/...
CA - Collision avoidance
Deauth
AP radio
Dynamic Rate switching
33. In order to set up an ad hoc network a user must know which two parameters?
Client
Carefully plan a strategy using WEP and VLANs
Authenticate - associate
SSID and Channel
34. Management frames are sent in....
Arp replay
1 - 5.5 and 11 Mbps
25 MHz
Plaintext
35. What organization is responsible for unlicensed frequency band regulations in the United States?
Semi directional and Highly directional
Passphrase
FCC
Trojan/Rogue APs - Arp spoofing - DNS spoofing
36. The 802.11g standard uses which two speed spectrum technologies.
Interoperability testing organization
Open system
ERP-OFDM - DSSS
14
37. What item has an effect on RF line of site?
14
Small Office/Home Office Organizations (SOHO)
Passphrase
Obstacles
38. When an RF signal bounces off a smooth non absorptive surface - the behavior is
802.11g
Reflection
Plaintext
Trojan/Rogue APs - Arp spoofing - DNS spoofing
39. ___ is the latest standard in the mobile network technology tree that produced the GSM/EDGE and UMTS/HSPA network technologies
Greenfield mode
AP radio
LTE
RC4
40. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Number of users and software applications in use
WPA2
Height of an RF signal
Authenticate - associate
41. 802.11g is backward compatible to which of the following IEEE wireless LAN standards?
802.11b HR/DSSS and 802.11 DSSS
HT 20 MHz protection mode
Repeater
Two
42. These are user configurable and present in only five 802.11 frame types...
802.11r
Management
Beacons - Probe request - Probe response - Association Request - Reassociation Request
Monitor
43. 3 types of antennas
Acknowledgement frames
Frequency
Highly directional= Parabolic = 3-15 degrees - Omnidirectional= Rubber duck = 360 degrees - Semidirectional= Panel = 180 degrees
RC4
44. Which process is a VPN solution intended to provide for users connection to a network
Acknowledgement frames
Residential and Enterprise
Secure Layer 3 transmissions over a public network infrastructure
Access point
45. You are a wireless network administrator monitoring the reports for a recently installed wireless intrusion prevention system. You receive an alert notifying you of high levels of RF detected from an access point operating as a sensor and currently s
14
FCC
Interference from a neighboring access point RF denial-of-service (Dos) attack
Mesh network
46. You are a sales engineer connected to an IEE 802.11a access point with a mobile computer. As you move away from the access point - the connection speed slows to the next lowest supported data rate. The change in data rate is described by what term?
Dynamic Rate switching
Spoof an address
X.509 certificates on the subscriber side only.
802.11
47. WiMAX 802.16 authentication is based on...
Root mode
6 -12 - and 24 Mbps
X.509 certificates on the subscriber side only.
Workgroup Bridge mode.
48. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
11
Arp
WPA 2.0 personal and WPS
One or more
49. What is the term defining the amount of times a cycle of an RF signal will oscillate in one second?
Frequency
ARP spoofing
Brute force - statistical and dictionary
ERP protection
50. The security amendment to the IEEE 802.11 standard requires ____
CCMP
X.509 certificates on the subscriber side only.
Passve Scanning
BSSID (Basic Service Set identifier)