SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Aireplay-ng -0
Deauth
Wireless Game adapters and Media Bridges
Mismatched SSID
Know the SSID and enter it manually
2. This is a topology in which two or more APs are connected by a common distribution system.
Extended Service Set (ESS)
Degradation
Refraction
Trojan/Rogue APs - Arp spoofing - DNS spoofing
3. 4 types of Denial of Service attacks
Open system
Access point
CTS attacks - Deauth attack - Association flood - Jamming
FCC
4. What algorithm does WEP use
802.11
Managed
32 character maximum and is case sensitive
RC4
5. Give two examples of WGB devices.
32 character maximum and is case sensitive
Data rate increases
Wireless Game adapters and Media Bridges
Unicast
6. What two devices use RF to communicate
Single radio AP's
Obstacles
Transmitter and receiver
A VPN to the office network
7. WHich security solution is mandatory for client devices in order to be considered Wi-Fi Protected setup certified?
Management
Arp replay
ERP-OFDM - DSSS
PIN
8. This is the most common WLAN topology which uses one AP to support clients in a single cell of coverage and has one unique SSID.
Indoor and outdoor
WPA2
Repeater
Basic Service Set (BSS)
9. Which security methods do 802.11g access points support?
WPA Enterprise -WEP -MAC filters
Passive scan
WPA/WPA2
7
10. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
Workgroup Bridge mode.
WPA2
Carefully plan a strategy using WEP and VLANs
PIN
11. This is typically the 48-bit MAC address of the access point's radio card.
BSSID (Basic Service Set identifier)
CTS attacks - Deauth attack - Association flood - Jamming
Wireless gateways
Root mode
12. the amplitude of an RF signal is
Height of an RF signal
WPA2
Independent
32 character maximum and is case sensitive
13. In this mode a station can act as a relay or WLAN range extender
SSID (service set identifier)
Two
Repeater
Bridge mode
14. In order for a wireless client to become completely part of the basic service set it must first ___ then ___
Restricts access to authorized users
Captive portal
Authenticate - associate
Obstacles
15. What best describes the Wi-Fi alliance?
25 MHz
Interoperability testing organization
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Independent
16. Which process is a VPN solution intended to provide for users connection to a network
SSID and Channel
Secure Layer 3 transmissions over a public network infrastructure
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
HT 20 MHz protection mode
17. You are a help desk support technician at a retail department store and you receive a call from a manager in the administrative offices. He complain the performance of his 802.11g notebook computer decreases several times throughout the day. Upon vis
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Unicast
Indoor and outdoor
ERP protection
18. A pre-shared key mode may be vulnerable to a ____ attack
X.509 certificates on the subscriber side only.
Trojan/Rogue APs
Dictionary
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
19. What protocol am I? - 2.4 GHz freq - 54 Mbps Data Rate - OFDM W/ DSSS backup
802.11g
SSID and Channel
Acknowledgement frames
802.11n
20. Two authentication types defined in the 802.11 standard
Diffraction
Open system and Shared key
MAC
Mesh network
21. ___ are used to describe the basic components and topology of a WLAN
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
6 -12 - and 24 Mbps
Service sets
Repeater
22. According to the 802.11a amendment - which data rates are mandatory?
802.11
6 -12 - and 24 Mbps
Small Office/Home Office Organizations (SOHO)
Basic Service Set (BSS)
23. The association process happens after which phase?
Wireless gateways
Authentication
Dual radio APs
HT fixed mode
24. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Deauth
AP to AP
4 channels
Arp replay
25. 802.11 uses CSMA/...
Active scanning
Refraction
Station (STA)
CA - Collision avoidance
26. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
Trojan/Rogue APs
Beacons - Probe request - Probe response - Association Request - Reassociation Request
32
64-bit - 128-bit
27. how many channels are available for wireless LAN use in the unlicensed 2.4GHz ISM band?
CTS attacks - Deauth attack - Association flood - Jamming
ERP-OFDM - DSSS
14
Authentication
28. 2.4 GHz - Ch 1-14 - North America Ch =1-11 - Overlapping 1-6-11
RC4
Passive scan
ISM
Mesh network
29. Both ___ and ___ are wireless LAN security methods that support shared key security.
BSSID (Basic Service Set identifier)
Wireless Game adapters and Media Bridges
AES = CCMP required
WPA2 -WEP
30. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Indoor and outdoor
UNII
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
Single radio AP's
31. Name 3 channels considered non overlapping in the 2.4GHZ band
802.11i
Small Office/Home Office Organizations (SOHO)
1 -6 -11
Personal mode and Enterprise Mode
32. Management frames are sent in....
Brute force - statistical and dictionary
Authenticate - associate
Plaintext
Quality of Service
33. In repeater mode - the repeater device connects to a normal '___ mode'
Root mode
Trojan/Rogue APs - Arp spoofing - DNS spoofing
HT fixed mode
11
34. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
802.11a
Watt and mW
Number of users and software applications in use
Data rate increases
35. When a wireless LAN device listens for beacon frames - it is participating in which phase?
Passve Scanning
WPA 2.0 personal and WPS
BSSID (Basic Service Set identifier)
Indoor and outdoor
36. a beacon frame advertises information about the wireless network. A beacon frame is what type of frame?
Access point
Management
Repeater
Interoperability testing organization
37. Typically a point-to-multipoint link consists of ____ connections
Monitor
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Three
Spoof an address
38. What kind of Algorithm does WPA2 use?
Open system
AES = CCMP required
Three
Access point
39. You need to attend a business meeting out of town that requires air travel. You are at the airport and have some extra time. While waiting to board your plane you decide to check your office e-mail using 802.11g hotspot access point at the airport. I
Basic Service Set (BSS)
Trojan/Rogue APs - Arp spoofing - DNS spoofing
A VPN to the office network
Station (STA)
40. Maximum length of data (Frame body) is 2304 when ____ is not in use
7
PIN
Encryption
Access point
41. This is a network name used to identify an 802.11 WLAN. It May be up to 32 characters and is case sensitive.
2304 bytes
Fake auth
SSID (service set identifier)
Access point
42. The card is set to passively monitor all wireless signals at the RF level and is not part of any network nor is it joined to any access point
Interference from a neighboring access point RF denial-of-service (Dos) attack
SSID (service set identifier)
Monitor
Management
43. The range of a 2.4GHz signal is mostly dependent on what RF characteristic?
Passphrase
WPA 2.0 personal and WPS
Wavelength
Single radio AP's
44. A newly configured wireless intrusion prevention system will___
Automatically monitor the network for attacks
Managed
Arp replay
Beacons - Probe request - Probe response - Association Request - Reassociation Request
45. According to the IEEE 802.11 standard - an extended service set (ESS) consists of how many interconnected basic service sets?
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
One or more
Wavelength
Plaintext
46. An independent basic service set (IBSS) consists of how many access points?
Single radio AP's
0
40 bit
Arp replay
47. 802.11a uses which spread spectrum technology?
OFDM
1 - 5.5 and 11 Mbps
Dynamic Rate switching
Monitor
48. Two characteristics of signals are
AP radio
Greenfield mode
Amplitude and phase
Semi directional and Highly directional
49. This is the default mode that sets the card as a client that could then connect to an AP
Restricts access to authorized users
Other 802.11a devices
OFDM
Managed
50. if operating with _____ - clients and AP communications all contend for the same half-duplex medium which causes a degradation of overall throughput
Warning
: Invalid argument supplied for foreach() in
/var/www/html/basicversity.com/show_quiz.php
on line
183