Do you know that? Find a project management application you like and stick to it. next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Elance test answers << Eng. & Mfg. category

Test answers for Wi-Fi 2016

(79) Last updated: February 28
Elance • Eng. & Mfg.
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

79 Answered Test Questions:

1. The most common way to secure a wireless connection is to use:

Answers:

• KEP

• SEP

• AEP

• WEP

2. WPA stands for:

Answers:

• Wifi Public Access

• Wifi Protected Access

• Wifi Private Access

• Wifi Packet Access

3. If a device that is rated at 40 milliwatts (mW) is added to a connector whose resistance reduces the power by 3 decibels (-3dB), what is most likely to be the device's power rating?

Answers:

• 6.6 milliwatts (mW)

• 100 milliwatts (mW)

• -50 milliwatts (mW)

• 20 milliwatts (mW)

4. IEEE 802.11af allows WLAN operation within what two ITU-designated radio wave frequency ranges?

Answers:

• ELF and SLF

• ULF and VLF

• VHF and UHF

• LF and MF

5. Antenna gain is characterized by what unit of measurement?

Answers:

• mW or W

• dBi or dBd

• dM or pM

• Hz or GHz

6. Which of the following is not one of the layers of the OSI networking model?

Answers:

• Layer 5 - Security

• Layer 1 - Physical

• Layer 3 - Network

• Layer 2 - Data

7. One technique used in attempts to crack a cipher or authentification mechanism is to try hundreds, maybe millions of possible passwords or phrases. What is this technique called?

Answers:

• a "Fibonacci sequence"

• a "highjack"

• a "systematic barage"

• a "dictionary attack"

8. IEEE 802.11i is also referred to as:

Answers:

• WEP2

• WPA2

• WPA

• WEP

9. Which of the following can be effectively used to restrict unnecessary traffic on your wireless network?

Answers:

• Firewall

• Encryption

• MAC Address

• Network Interface

10. Some wireless routers provide QoS to help prioritize traffic. What does QoS stand for?

Answers:

• Quotient of Service

• Quotient of System

• Quality of Schematic

• Quality of Service

11. The diameter of a hotspot area is about:

Answers:

• 600-700 feet

• 800-1000 feet

• 100-500 feet

• 600-1000 feet

12. In many cases municipal wifi networks are being created with a combination of:

Answers:

• muniwifi and wifi

• wimax and wifi

• largewifi and smallwifi

• muniwif and muniwifi

13. What does DNS stand for?

Answers:

• Domain Name System

• Dynamic Naming Server

• Deterministic Network System

• Dynamic Network System

14. Which one is the most secure?

Answers:

• WEP

• WPA

• WPA4

• WPA2

15. The radio waves of a WLAN are generated by which device?

Answers:

• updated drivers

• modem

• router

• hard drive

16. Which of the following ISM bands is likely to be the most heavily populated?

Answers:

• 544 GHz

• 2.4 GHz

• 6.765 MHz

• 1.74 MHz

17. The wavelength of an electromagnetic signal is inversely proportional to what other feature of that signal?

Answers:

• the signal's resistance in ohms

• the signal's power in mW

• the power of the signal's source in mW

• the signal's frequency

18. The Wired Equivalent Privacy (WEP) security algorithm was first introduced in 1997 by what professional association?

Answers:

• AAR

• CASE

• GMEA

• IEEE

19. When you connect to a wireless network, you are assigned an IP address. What is an IP address?

Answers:

• Integrated Protocol addresses used to share data with mobile phones

• Instant Protocol Address used to surf the internet

• Integrated Programming addresses used to share data with mobile phones

• Internet Protocol address used to identify computers on the network

20. Wifi was built to move:

Answers:

• audio

• video

• air traffic

• data traffic

21. WPA2 increased the security of WPA from 128 bits to how many bits?

Answers:

• 256 bits

• 620 bits

• 160 bits

• 432 bits

22. What does AP stand for?

Answers:

• amplified power

• access point

• authorization port

• augmented primer

23. By using this type of wireless connection, you computer is secure from prying eyes:

Answers:

• AIO

• MIMO

• Air Gap

• Encrypted

24. True or false? Wimax offers larger coverage areas with greater bandwidth and speeds compared to wifi.

Answers:

• True

• False

25. Wifi works on radio band:

Answers:

• 802.13

• 802.09

• 802.15

• 802.11

26. Which of the following can redirect an Internet signal to multiple end users?

Answers:

• scanner

• transmitter

• router

• printer

27. Which of the following devices would definitely not use WiFi?

Answers:

• (none of these)

• smartphone

• tablet computer

• laptop computer

28. Wifi is used to connect devices to:

Answers:

• Ipad

• DEsktop

• Internet

• PDS

29. A specific location in which an end user can access the Internet wirelessly:

Answers:

• access point

• internet point

• oval point

• entry point

30. What does the W in WLAN stand for?

Answers:

• wide

• wireless

• web

• world

31. What is the term assocaited with DHCP that allows your computer to acces other computers outside your network?

Answers:

• Tunnel

• Gateway

• Gatekeeper

• SOCKS

32. Which of the following may cause transmission interference with a wireless sign?

Answers:

• mountains

• (all of these)

• buildings

• trees

33. Which frequencies does Wifi use to transmit data?

Answers:

• radio

• audio

• sound

• light

34. True or False? The more users that share an access point, the slower a wireless network can become.

Answers:

• False

• True

35. An IPaddress gets assigned to a computer by a wireless router. what performs this?

Answers:

• DHCP

• BGP

• LDAP

• IPAU

36. What does the term WLAN refer to?

Answers:

• Wireless Logical Analog Node

• Wireless Length Amplitude

• Wireless Local Area Network

• Wireless Language

37. What is the most basic difference between a WLAN and an Ethernet LAN?

Answers:

• A WLAN does not use security protocols while a Ethernet LAN does.

• A WLAN is automatically encrypted while a Ethernet LAN is not.

• A WLAN uses licensed frequencies while a Ethernet LAN uses unlicensed frequencies.

• A WLAN uses radio waves, while a Ethernet LAN uses some form of cable.

38. When trying to connect to a wireless network, at times it's name is hidden. What is the technical term for this wireless name?

Answers:

• LNAM

• Annonymous

• SSID

• WNAM

39. Which of the following allows your computer to send and receive wireless signals to and from the internet?

Answers:

• all access network interface card

• local area network interface card

• wireless network interface card

• wide area network interface card

40. Which of the following is true?

Answers:

• Wireless networks allow greater mobility than wired.

• Wireless networks are more secure than wired

• Wireless networks are more reliable than wired.

• Wired networks are generally cheaper than wireless.

41. What do you call the name of a network that is broadcast by a router?

Answers:

• EPP (encryption protocol point)

• WEP (wireless entry point)

• SSID (service set identifier)

• BUHT (broadcast unit hub tag)

42. Wireless keys are:

Answers:

• decimal numbers

• octal numbers

• hexadecimal numbers

• binary numbers

43. Wireless networks can operate on one of which two modes?

Answers:

• oblique mode or nominal mode

• generative mode or non-generative mode

• ad hoc mode or infrastructure mode

• basic mode or multiple-source mode

44. Of the following choices, which 802.11 offers the highest potential speeds?

Answers:

• 802.11n

• 802.11a

• 802.11g

• 802.11b

45. What is the unique identifier tied to your wireless or wired ethernet card called?

Answers:

• Media Access Client

• Menu Access Client

• Media Access Control

• Multiple Address Client

46. The strength of a Wi-Fi wireless radio signal is measured using what standard unit?

Answers:

• milliwatts (mW)

• hertz (Hz)

• decibels (dB)

• ohms

47. Which of the following security systems was marked as "deprecated," and therefore a security risk, in 2004?

Answers:

• TKIP

• WPA

• EAP

• WEP

48. IEEE 802.11 wireless LAN use a media access control protocol called:

Answers:

• Carrier Sense Multiple Access with Collision Detection

• Carrier Sense Single Access with Collision Detection

• Carrier Sense Multiple Access without Collision Detection

• Carrier Sense Multiple Access

49. A decibel (dB) is a ratio determined by what two power quantities?

Answers:

• amplitude and phase shift

• energy and valence

• wavelength and frequency

• signal and noise

50. Which of the following would an outdoor WLAN most likely require?

Answers:

• a gain of no less than 2000 dBm

• frequency modulators that accounted for atmospheric interference

• RJ45 connectors

• attenas with a direct path for the signal

51. What do the letters DSSS stand for?

Answers:

• Direct-System Server Software

• Direct-Sequence Spread Spectrum

• Direct-Solution Software System

• Direct-Service System Standards

52. A wireless network card operates at roughly what rate of power?

Answers:

• 1 mW

• 100-600 cW

• 1000 dW

• 1 W

53. A typical off-the-shelf router (made by Netgear, Linksys, etc.) transmits with a power of roughly how many milliwatts?

Answers:

• 1500 to 3000 mW

• 500 to 1000 mW

• 20 to 30 mW

• 200 to 300 mW

54. IEEE 802.1X security protocol uses which three components?

Answers:

• supplicant, authenticator, authentication server

• petitioner, barrier, gate

• mark, monitor, master key

• client, password, verifying software

55. True or False? A WPAN will generally have a larger area of coverage than a WLAN.

Answers:

• True

• False

56. IEEE's 802.11 provides specifications for which two facets of WLAN communication?

Answers:

• data link (DAT) and interface protocol (IP)

• network protocol (NP) and transport reliability (TP)

• media access control (MAC) physical layer (PHY)

• concatenation and separation (CAS) and connection reinitiation (CAR)

57. Which of the following refers to  unauthorized tapping into another's wifi connection with a public utility?

Answers:

• Piggybacking

• Stalking

• Backtracking

• Rollback

58. Which of the following is not a feature WPA2 security?

Answers:

• AES support

• Penetration Detection Service (PDS)

• Message Integrity Code (MIC)

• Temporal Key Integrity Protocol (TKIP)

59. What is it called when some drives around looking for available provate access points?

Answers:

• Stumbling

• Wardriving

• Strolling

• Piggybacking

60. Which of the following is not one of the three main tools used to decrease the security risks that accompany a WLAN?

Answers:

• intrusion tools

• VIA protocol

• mutual authentication

• encryption

61. The 2.4-GHz band is broken down into how many channels?

Answers:

• 25

• 14

• 15

• 5

62. Which of the following is not an unlicensed ISM band?

Answers:

• 900 MHz

• 2.4 GHz

• 5.8 GHz

• 150 MHz

63. What is the name given to individuals who search for unsecure networks in the hope of gaining free access to the internet?

Answers:

• AP predators

• schrodingers

• war drivers

• tappers

64. Which of the following is not a common modulation method used in wireless communication?

Answers:

• OFDM

• DSSS

• CAHS

• FHSS

65. What does EIRP stand for?

Answers:

• Effective (or Equivalent) Isothermic Rate Provider

• Effective (or Equivalent) Isolated Router Port

• Effective (or Equivalent) Isotropic Radiated Power

• Effective (or Equivalent) Isometric Radio Port

66. Which of the following frequencies would have the greatest penetration of potential sources of interferences such as walls or trees?

Answers:

• 15 GHz

• 5.8 GHz

• 2.4 GHz

• 900 MHz

67. What is the name of a newer trend in which large mesh networks of wifi are provided over a large geographical area?

Answers:

• Large-wifi

• Big-wifi

• Muni-wifi

• City-wifi

68. An 802.11 frame may contain up to how many address fields?

Answers:

• four

• eight

• ten

• six

69. Wifi does not support roaming? True or False

Answers:

• False

• True

70. Wimax works on radio band:

Answers:

• 802.16

• 802.14

• 802.15

• 802.13

71. Which of the following is not an organization that influences the standards used for WLANs today?

Answers:

• ITU-R

• World IWR

• IEEE

• Wi-Fi Alliance

72. Which of the following keys is commonly used on wireless computer networks to increase their security?

Answers:

• private

• wireless

• public

• secret

73. What is the fixed bandwidth defined by Wifi standard for 802.11g?

Answers:

• 5MHz

• 20MHz

• 100Hz

• 25MHz

74. What is the fixed bandwidth defined by Wifi standard for 802.11b?

Answers:

• 5MHz

• 20MHz

• 25MHz

• 100Hz

75. To prevent annoucement of the existence of your wireless network, you should disable identifier:

Answers:

• annoucement

• braodcasting

• enabling

• creation

76. Wifi uses which kind of multiplexing:

Answers:

• OFDM

• WDM

• FDM

• TDM

77. IEEE 802.11 includes the specifications for WLAN technologies that make use of radio waves and what other kind of electromagnetic radiation?

Answers:

• ultraviolet

• (none of these)

• gamma-rays

• infrared

• square-waves

78. Quality of Service (QoS) capabilities are incorporated in Wifi with the adoption of:

Answers:

• IEEE 802.11n standard

• IEEE 802.11e standard

• IEEE 802.11g standard

• IEEE 802.11a standard

79. Which of the following modulation is used by Wifi?

Answers:

• phase

• adaptive

• pulse

• frequency