SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Wireless Technology Specialist
Start Test
Study First
Subject
:
it-skills
Instructions:
Answer 50 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. This is typically the 48-bit MAC address of the access point's radio card.
Wireless Game adapters and Media Bridges
BSSID (Basic Service Set identifier)
Beacons - Probe request - Probe response - Association Request - Reassociation Request
FHSS
2. What type of wireless network device is PIN-based security most commonly used with
Reflection
SOHO brands that support WPS
Know the SSID and enter it manually
Frequency
3. WiMAX 802.16 authentication is based on...
Fake auth
Single radio AP's
RTS/CTS
X.509 certificates on the subscriber side only.
4. The radio card can operate in one of up to six possible modes of operation...
Walled Garden.
Managed - Master - Monitor - Mesh - Ad-hoc - Repeater
Refraction
802.11
5. This is the default mode that sets the card as a client that could then connect to an AP
Ad-hoc mode - also calles Independent Basic Service Set (IBSS) - or Peer-to Peer. The client that initiated the network will randomly generate a BSSID value to use within the network.
CTS attacks - Deauth attack - Association flood - Jamming
Managed
Arp replay
6. In this mode a station can act as a relay or WLAN range extender
TKIP - optional RC4
Data rate increases
One or more
Repeater
7. Which if the following organizations is responsible for standards compliance?
40 bit
Height of an RF signal
Wi-Fi Alliance
Watt and mW
8. An independent basic service set (IBSS) consists of how many access points?
Obstacles
AES = CCMP required
0
Arp replay
9. A service set identifier (SSID) has a maximum limit of how many characters?
32
40 bit
MAC
Transmitter and receiver
10. How many channels are available for wireless LAN use in the unlicensed middles UNII 2e band?
Dynamic Rate switching
FCC
Antenna diversity
11
11. How many different channels are available for wireless LANs to use in the unlicensed UNII-1 band?
Open system and Shared key
7
Reflection
4 channels
12. This type of attack is used to stimulate large amounts of traffic on the network for statistical attacks on WEP
2.4-2.5GHz
Number of users and software applications in use
Arp replay
HT 20 MHz protection mode
13. an 802.11b 2.4GHz channel is how wide in MHz?
Fakeauth
Independent
22MHz wide
7
14. Management frames are sent in....
HT fixed mode
Plaintext
802.11r
32
15. How many non-overlapping channels are available in the unlicensed 2.4GHz ISM band?
SSID (service set identifier)
HT Non member protection mode
FCC
3
16. In this mode - the card acts as a normal access point
802.11i
Client
Master
802.11
17. 802.11g LAN operates in what frequency range?
Enter a username and password that will be central administered
2.4-2.5GHz
FHSS
32
18. You are a network administrator and are asked for a security recommendation regarding older wireless 802.11-compliant VoIP handsets. The company does not have the budget to upgrade the equipment at this time. Which would be the best recommendation yo
802.11r
Carefully plan a strategy using WEP and VLANs
ERP-OFDM - DSSS
DB and dBi
19. Wireless gateways come in two primary forms...
ISM
802.11b HR/DSSS and 802.11 DSSS
Frequency
Residential and Enterprise
20. ____ is the wireless amendment that specifies how to conduct seamless handoffs.
802.11r
Wavelength
OFDM
IPSec
21. This type of MITM attacks mimics the SSID to lure clients in to associating with the attackers device
WPA/WPA2
Trojan/Rogue APs
AP to AP
Walled Garden.
22. The remote authentication dial in user service (RADIUS) service requires users on a wireless network to perform what function?
Frequency
Enter a username and password that will be central administered
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
UNII
23. Layer 2 Tunneling Protocol commonly uses which encryption method?
3
0
Root mode
IPSec
24. Similar to bridging - Access Points operating in a wireless ___ network form a multipoint-to-multipoint network. This type of networking has been used to form Municipal WiFi networks in many cities.
Restricts access to authorized users
4 channels
Client
Mesh network
25. The 802.11i amendment to the standard addresses which of the following technologies?
Security
Degradation
Number of users and software applications in use
802.11b HR/DSSS and 802.11 DSSS
26. in the 802.11a amendment - the UNII-3 band can be used for which WLAN applications?
Dynamic Rate switching
WEP
IPSec
Indoor and outdoor
27. You are a technical support engineer and provide help desk support for the network in a manufacturing company. You receive a call from the sales manager - who wants to know how power save operations should be set up on her notebook computer to optimi
0
Indoor and outdoor
Active mode
Greenfield mode
28. In order to set up an ad hoc network a user must know which two parameters?
SSID and Channel
Interoperability testing organization
Carefully plan a strategy using WEP and VLANs
802.11w
29. What organization is responsible for unlicensed frequency band regulations in the United States?
Independent
14
FCC
MAC
30. Which items are unique to a service set identifier
Carefully plan a strategy using WEP and VLANs
32 character maximum and is case sensitive
Active mode
Client
31. The open system authentication process uses how many frames?
Two
Acknowledgement frames
DBi
Master
32. Aireplay-ng -3
Arp
Independent
Wireless gateways
40 bit
33. Point to Point links typically use which antenna types?
Semi directional and Highly directional
2.4-2.5GHz
6 -12 - and 24 Mbps
40 bit
34. A basic service set (BSS) consists of how many access points
Data rate increases
1
SSID and Channel
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
35. Name 3 channels considered non overlapping in the 2.4GHZ band
802.11b
Reflection
Number of users and software applications in use
1 -6 -11
36. WI-Fi Protected Setup was designed for which of the following wireless applications?
Obstacles
802.11w
Small Office/Home Office Organizations (SOHO)
Security
37. A ______________ does not always use an omnidirectional antenna
Mesh network
802.11n
Refraction
Point-to-point link
38. You support a wireless network for an office of five employees. The installation consists of one access point - three notebook computers - and two desktop computers. The access point and computers in the office have wireless adapters that are Wi-Fu W
WPA 2.0 personal and WPS
Basic Service Set (BSS)
1 - 5.5 and 11 Mbps
Encryption
39. The Access point can operate in a variety of modes...
RTS/CTS
Root mode - Bridge mode - Workgroup Bridge mode - Workgroup Bridge mode - Repeater Mode - Mesh Mode - Scanner Mode.
Arp
Obstacles
40. These are user configurable and present in only five 802.11 frame types...
X.509 certificates on the subscriber side only.
Secure Layer 3 transmissions over a public network infrastructure
Open system
Beacons - Probe request - Probe response - Association Request - Reassociation Request
41. Aireplay-ng -1
802.11a
Fakeauth
Repeater
802.11g
42. WPA was developed as an interim solution for which amendment to the 802.11 standards?
MAC
802.11i
802.11r
1
43. What best describes the Wi-Fi alliance?
Interoperability testing organization
Interference from a neighboring access point RF denial-of-service (Dos) attack
Trojan/Rogue APs
Access point
44. A ___ is end-user nodes such as desktop -laptop or PDA computers or any device that needs wireless connectivity into the wireless network infrastructure
802.11b HR/DSSS and 802.11 DSSS
Client
LTE
Passve Scanning
45. A newly configured wireless intrusion prevention system will___
32 character maximum and is case sensitive
Automatically monitor the network for attacks
HT fixed mode
CTS attacks - Deauth attack - Association flood - Jamming
46. When an IEEE 802.11g wireless LAN consists only of wireless client stations - the network is operating as what type of basic service set?
802.11w
Quality of Service
MAC
Independent
47. What protocol am I? - 5.0GHz Freq - 54 Mbps Data rate - OFDM
Quality of Service
802.11g
11
802.11a
48. High throughput mode 3
Passve Scanning
Wireless gateways
HT fixed mode
Unicast
49. ____ is also known as the Protected management frame standard
25 MHz
Personal mode and Enterprise Mode
802.11w
WPA Enterprise -WEP -MAC filters
50. What protocol am I? - 2.4 GHz Freq - 11 Mbps Data Rate - DSSS
802.11b
Authenticate - associate
Independent
DB and dBi