1) Wireless network standards operate at ________.
- A) the data link layer
- B) the internet layer
- C) Both A and B
- D) Neither A nor B
Answer: A
2) Wireless network standards come from ________.
- A) OSI
- B) TCP/IP
- C) Both A and B
- D) Neither A nor B
Answer: A
3) Wireless LAN standards are created by the ________ Working Group.
- A) 802.1
- B) 802.3
- C) 802.11
- D) 802.3W
Answer: C
4) Wireless access points typically link wireless clients to ________.
- A) wireless servers
- B) servers on the wired network
- C) Both A and B
Answer: B
5) Wireless radio transmission usually is expressed in terms of ________.
- A) wavelength
- B) frequency
- C) Both A and B
- D) Neither A nor B
Answer: B
6) Frequency is measured in terms of ________.
- A) nanometers
- B) hertz
- C) Both A and B
- D) Neither A nor B
Answer: B
7) The other wireless device is far away in a known direction. You should use ________.
- A) an omnidirectional antenna
- B) a dish antenna
- C) Both A and B
- D) Neither A nor B
Answer: B
8) Cellular telephony uses ________.
- A) an omnidirectional antenna
- B) a dish antenna
- C) Both A and B
- D) Neither A nor B
Answer: A
9) Radio has more reliable transmission than UTP.
Answer: FALSE
10) Attenuation with distance is faster with ________.
- A) UTP transmission
- B) radio transmission
- C) Both A and B
- D) Neither A nor B
Answer: B
11) If the signal strength at 20 meters is 90 mW, the signal strength at 60 meters would be 10 mW.
Answer: FALSE
12) The most serious problem with wireless transmission in WLANs is ________.
- A) inverse square law attenuation
- B) absorptive attenuation
- C) shadow zones
- D) multipath interference
Answer: D
13) What propagation problem becomes worse as frequency increases?
- A) Inverse square law attenuation.
- B) Electromagnetic interference.
- C) Both A and B
- D) Neither A nor B
Answer: D
14) What propagation problem becomes worse as frequency increases?
- A) Absorptive attenuation.
- B) Electromagnetic interference.
- C) Both A and B
- D) Neither A nor B
Answer: A
15) What propagation problem becomes worse as frequency increases?
- A) Absorptive attenuation.
- B) Shadow zones.
- C) Both A and B
- D) Neither A nor B
Answer: C
16) The frequency spectrum extends ________.
- A) into the gigahertz range
- B) into the visible light range
- C) into the ultraviolet range
- D) to infinity
Answer: D
17) The total range of possible 802.11 WLAN frequencies in the 2.4 GHz band constitutes ________.
- A) a frequency spectrum
- B) a broadband
- C) a channel
- D) a service band
Answer: D
18) The terms channel and service band mean roughly the same thing.
Answer: FALSE
19) To handle multiple conversations in radio transmission, you use multiple ________.
- A) channels
- B) frequencies
- C) service bands
- D) wires
Answer: A
20) Signals usually ________.
- A) travel at a single frequency
- B) spread over a range of frequencies
Answer: B
21) A channel extends from 55 MHz to 60 MHz. Its bandwidth is ________.
- A) 60 MHz
- B) 55 MHz
- C) 65 MHz
- D) None of the above
Answer: D
22) To transmit very rapidly in RADIO, you need ________.
- A) single-frequency transmission
- B) single-mode transmission
- C) wide bandwidth
- D) narrow bandwidth
Answer: C
23) Channels with wide bandwidths are called ________ channels.
- A) multimode
- B) full-duplex
- C) broadband
- D) modulated
Answer: C
24) To transmit data very rapidly, you would want a ________ channel.
- A) narrowband
- B) broadband
- C) single-frequency band
- D) Any of the above
Answer: B
25) Networks that are fast are often called broadband whether or not they use radio channels.
Answer: TRUE
26) In the Shannon Equation, C is the ________.
- A) actual speed of transmission in a channel
- B) maximum possible speed of transmission in a channel
- C) minimum possible speed of transmission in a channel
- D) channel bandwidth
Answer: B
27) In the Shannon Equation, if you quadruple the bandwidth in a channel while the signal-to-noise ratio remains the same, you can transmit ________.
- A) Log2(1+4) times as fast
- B) Log2(1+1/4) times as fast
- C) about 4 times as fast
- D) at the same speed, but more reliably
Answer: C
28) The frequency range from 500 megahertz to 10 gigahertz is called the ________.
- A) frequency spectrum
- B) commercial mobile service band
- C) unlicensed band
- D) golden zone
Answer: D
29) If a radio transmission is easily blocked by obstacles, then you need to maintain ________.
- A) a clear line of sight
- B) spread spectrum transmission interference
- C) broadband transmission
- D) deep transmission
Answer: A
30) WLANs normally use ________.
- A) licensed bands
- B) unlicensed bands
Answer: B
31) In unlicensed bands, ________.
- A) you can use radios wherever you please
- B) you can prevent nearby businesses from setting up access points in the same channel
- C) Both A and B
- D) Neither A nor B
Answer: A
32) Interference is minimized in ________.
- A) licensed bands
- B) unlicensed bands
Answer: A
33) 802.11 standards are being developed to work in the ________ unlicensed band.
- A) 2.4 GHz
- B) 5 GHz
- C) Both A and B
- D) Neither A nor B
Answer: C
34) In 802.11, channel bandwidth usually is ________.
- A) 20 GHz
- B) 40 GHz
- C) 20 MHz
- D) 40 MHz
Answer: C
35) Which unlicensed band is defined the same way in most countries around the world?
- A) 2.4 GHz.
- B) 5 GHz.
- C) Both A and B
- D) Neither A nor B
Answer: A
36) Which unlicensed band provides greater propagation distance for a given level of power?
- A) 2.4 GHz.
- B) 5 GHz.
- C) Both A and B allow about the same propagation distance.
Answer: A
37) The 2.4 GHz band supports ________ nonoverlapping 20 MHz channel(s).
- A) 1
- B) 3
- C) 7
- D) 11
Answer: B
38) The 5 GHz band supports about ________ nonoverlapping 20 MHz channel(s).
- A) 1
- B) 3
- C) 6
- D) 12
Answer: D
39) Spread spectrum transmission is used in WLANs because ________.
- A) it is required by regulators
- B) it offers strong security
- C) Both A and B
- D) Neither A nor B
Answer: A
40) Spread spectrum transmission is used in WLANs for ________.
- A) higher transmission speed
- B) more reliable transmission
- C) greater security
- D) All of the above
Answer: B
41) Spread spectrum transmission is used in commercial WLANs for security reasons.
Answer: FALSE
42) A channel has more bandwidth than is necessary given data transmission speeds requirements in ________ transmission.
- A) normal radio
- B) reliable commercial
- C) spread spectrum
- D) licensed
Answer: C
43) Which of the following uses OFDM?
- A) 802.11g.
- B) 802.11n.
- C) Both A and B
- D) Neither A nor B
Answer: C
44) When a WLAN is in use, the distribution system is the ________.
- A) collection of access points
- B) Ethernet network
- C) radio transmitter in an access point
- D) radio transmitter in the access point controller
Answer: B
45) Access points take frames from wireless devices and send these frames on to devices on the wired LAN.
Answer: FALSE
46) Access points take ________ from wireless devices and send them on to devices on the wired LAN. They also do the converse.
- A) packets
- B) frames
- C) Both A and B
- D) Neither A nor B
Answer: A
47) A wireless host sends a packet to a server on the company’s wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission?
- A) 1
- B) 2
- C) 4
- D) There will be one frame for each switch along the way.
Answer: B
48) An access point and the set of hosts it serves is called a(n) ________.
- A) BSS
- B) BSSID
- C) ESS
- D) None of the above
Answer: A
49) The ________ is the identifier in a basic service set.
- A) BSS
- B) BSSID
- C) SSID
Answer: B
50) To connect to an access point, you must know its ________.
- A) BSS
- B) DSS
- C) ESS
- D) None of the above
Answer: D
51) When a host moves from one wireless access point to another in a WLAN, this is ________.
- A) a handoff
- B) roaming
- C) Both A and B
- D) Neither A nor B
Answer: C
52) In 802.11 WLANs, the terms handoff and roaming mean the same thing.
Answer: TRUE
53) An extended service set (ESS) is a group of BSSs that ________.
- A) are connected to the same distribution system
- B) have the same SSID
- C) Both A and B
- D) Neither A nor B
Answer: C
54) In an extended service set, each access point ________.
- A) must have the same SSID
- B) must have different SSIDs
- C) must have coordinated SSIDs
- D) None of the above
Answer: A
55) The standard for roaming among access points is ________.
- A) 802.11r
- B) 802.11s
- C) 802.11W
- D) None of the above
Answer: A
56) What happens if two nearby access points use the same channel?
- A) They will interfere with each other.
- B) They will be bonded for joint operation automatically.
- C) They will be bonded for joint operation automatically if they use CSMA/CA+ACK.
- D) They will be bonded for joint operation automatically if they use RTS/CTS.
Answer: A
57) There is an access point that serves eight wireless hosts. On how many channels will these devices transmit during the course of an hour or two?
- A) 1
- B) 2
- C) 7
- D) 8
Answer: A
58) ________ is a technique for preventing two wireless stations from transmitting at the same time and therefore interfering with each other.
- A) Creating extended service sets
- B) Roaming
- C) The distribution system
- D) Media access control
Answer: D
59) An access point and a host it serves can transmit to each other simultaneously.
Answer: FALSE
60) Media access control governs transmission by ________.
- A) access points
- B) wireless hosts
- C) Both A and B
- D) Neither A nor B
Answer: C
61) When a wireless NIC wishes to transmit, it listens for traffic. If there is traffic, it waits. If there is no traffic, it may transmit.
- A) True.
- B) Sometimes true.
- C) False.
Answer: B
62) When a wireless NIC using CSMA/CD receives a frame correctly, it immediately sends back a reply without listening for traffic.
Answer: TRUE
63) CSMA/CA+ACK is reliable.
Answer: TRUE
64) CSMA/CA+ACK is ________.
- A) efficient
- B) inefficient
Answer: B
65) In ________, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a response, the host sending the original message may transmit. All other hosts must wait.
- A) CSMA/CA+ACK
- B) CSMA/CA
- C) CSMA/CD
- D) RTS/CTS
Answer: D
66) CSMA/CA+ACK usually is ________.
- A) required
- B) optional
Answer: A
67) Which of the following is usually optional in access point operation?
- A) CSMA/CA+ACK.
- B) RTS/CTS.
- C) Both A and B
- D) Neither A nor B
Answer: A
68) Which of the following is more efficient?
- A) CSMA/CA+ACK.
- B) RTS/CTS.
- C) Both are about equally efficient.
Answer: A
69) Which of the following is a full, according to the book?
- A) 802.11ac.
- B) 802.11ad.
- C) Both A and B
- D) Neither A nor B
Answer: D
70) Which of the following is a draft standard, according to the book?
- A) 802.11g.
- B) 802.11n.
- C) Both A and B
- D) Neither A nor B
Answer: D
71) For which standard is 300 Mbps a typical rated speed?
- A) 802.11ac.
- B) 802.11ad.
- C) 802.11g.
- D) 802.11n.
Answer: D
72) For which of the following is 100 meters a typical service distance?
- A) 802.11g.
- B) 802.11n.
- C) Both A and B
- D) Neither A nor B
Answer: B
73) Which of the following brings gigabit speeds to clients?
- A) 802.11ac
- B) 802.11g
- C) 802.11n
- D) None of the above
Answer: A
74) For wireless backup, which of the following is adequate?
- A) 802.11ac
- B) 802.11g
- C) 802.11n
- D) All of the above
Answer: A
75) Which of the following uses OFDM?
- A) 802.11g
- B) 802.11ac
- C) Both A and B
- D) Neither A nor B
Answer: A
76) Wider channel bandwidth ________.
- A) decreases transmission speed
- B) allows more channels to be used in a service band
- C) Both A and B
- D) Neither A nor B
Answer: A
77) Which of the following can operate in the 5 GHz band?
- A) 802.11g
- B) 802.11ac
- C) Both A and B
- D) Neither A nor B
Answer: A
78) In the 5 GHz band, how many channels can you have with 802.11ac with 80 GHz channels?
- A) 1
- B) 6
- C) 12
- D) 24
Answer: B
79) In the 60 GHz service band, ________.
- A) signals travel farther
- B) channel bandwidth can be very wide
- C) Both A and B
- D) Neither A nor B
Answer: B
80) MIMO ________.
- A) bonds channels for higher speed
- B) is used in all forms of 802.11
- C) uses a single spatial stream but multiple signals
- D) transmits multiple signals in the same channel
Answer: D
81) MIMO allows you to transmit two signals in the same channel.
Answer: TRUE
82) MIMO ________.
- A) increases throughput
- B) lowers propagation distance
- C) Both A and B
- D) Neither A nor B
Answer: A
83) Beamforming can ________.
- A) direct signal strength at individual wireless hosts
- B) transmit multiple spatial data streams in the same channel
- C) Both A and B
- D) Neither A nor B
Answer: A
84) Beamforming can allow an access point to ________.
- A) direct power to individual clients
- B) send signals to two different clients at the same time
- C) Both A and B
- D) Neither A nor B
Answer: C
85) Traditional MIMO can ________
- A) send multiple signals in the same channel
- B) send signals to two different clients at the same time
- C) Both A and B
- D) Neither A nor B
Answer: A
86) Another name for beamforming is having a smart antenna.
Answer: TRUE
87) In 802.11 networks, the speed I receive on my portable devices is a(n) ________.
- A) aggregate throughput
- B) individual throughput
- C) rated speed
- D) None of the above
Answer: B
88) If more users move to an access point, this decreases ________.
- A) individual throughput
- B) aggregate throughput
- C) Both A and B
- D) Neither A nor B
Answer: A
89) As a station moves away from an access point, the access point transmits more slowly to it.
Answer: TRUE
90) The presence of a client that is distant from the access point reduces the individual throughput of other clients served by that access point.
Answer: TRUE
91) If an 802.11n access point and an 802.11g client communicate, they communicate using ________.
- A) 802.11g
- B) 802.11n
- C) Either A or B
- D) Neither A nor B
Answer: A
92) Using unused transmission channels in a service band is called using ________.
- A) dark spectrum
- B) a smart antenna
- C) opportunistic agility
- D) white space
Answer: D
93) Two wireless devices communicate via Wi-Fi Direct using ________.
- A) an access point that lets them talk directly
- B) an Ethernet network to connect their access points
- C) Either A or B
- D) Neither A nor B
Answer: D
94) Mesh networking in 802.11 is likely to use ________.
- A) only wireless devices
- B) wireless devices and the site’s wired LAN
- C) Both A and B
Answer: A
95) The 802.11 standard for mesh networking is ________.
- A) 802.11m
- B) 802.11r
- C) 802.11ac
- D) None of the above
Answer: A
96) Two WLAN products that conform to the same standard will have almost equal performance.
Answer: FALSE
97) If a wireless client only has two MIMO antennas, an access point with three MIMO antennas will produce better performance than an access point with two MIMO antennas.
Answer: TRUE
Business Data Networks and Security, 9e (Panko)
Chapter 7 Wireless LANs II
1) To drive around a city looking for working access points that are unprotected is ________.
- A) drive-by hacking
- B) war driving
Answer: B
2) Breaking into WLANs is ________.
- A) drive-by hacking
- B) war driving
Answer: A
3) An unauthorized internal access point is a(n) ________.
- A) evil twin access point
- B) rogue access point
Answer: B
4) A rogue access point is an unauthorized access point.
Answer: TRUE
5) What security protocol originally came with 802.11 equipment?
- A) 802.11e
- B) 802.11i
- C) WPA
- D) WEP
Answer: D
6) What security protocol originally came with 802.11 equipment?
- A) 802.11i
- B) WEP
- C) Both A and B
- D) Neither A nor B
Answer: B
7) How long does it take an attacker to crack WEP today with readily available software?
- A) About ten seconds.
- B) About ten minutes.
- C) About ten hours.
- D) WEP cannot be cracked with readily available software.
Answer: A
8) WEP is so strong that it cannot be cracked with readily available software.
Answer: FALSE
9) WEP is a strong core security protocol.
Answer: FALSE
10) Who created WPA?
- A) The Internet Engineering Task Force.
- B) The 802.1 Working Group.
- C) The 802.11 Working Group.
- D) The Wi-Fi Alliance.
Answer: D
11) WPA was created by the Internet Engineering Task Force.
Answer: FALSE
12) 802.11i is attractive compared with WPA because ________.
- A) 802.11i offers stronger security
- B) 802.11i offers quality of service
- C) 802.11i was standardized by the Wi-Fi Alli
- D) All of the above
Answer: A
13) Which of the above offers stronger security?
- A) WPA
- B) 802.11i
- C) Both A and B offer equally strong security.
Answer: A
14) 802.11i offers stronger security than WPA.
Answer: TRUE
15) What is the strongest security protocol for 802.11 today?
- A) 802.11i
- B) 802.11s
- C) 802.11X
- D) WPA
Answer: A
16) What does the Wi-Fi Alliance call 802.11i?
- A) 802.1x
- B) 802.11X
- C) WPA
- D) WPA2
Answer: D
17) 802.11i and WPA2 are different names for the same standard.
Answer: TRUE
18) 802.11i uses ________ as its encryption method.
- A) RC4
- B) 802.11s
- C) AES-CCMP
- D) WPA
Answer: C
19) 802.11i uses WEP as its encryption method.
Answer: FALSE
20) WPA ________.
- A) has not been cracked at all
- B) has been partially cracked
- C) has been fully cracked but the crack is difficult
- D) has been fully cracked and the crack only takes minutes
Answer: B
21) In what mode of 802.11i operation is a central authentication server used?
- A) 802.1X mode.
- B) PSK mode.
- C) Both A and B
- D) Neither A nor B
Answer: A
22) A central authentication server is used in 802.11i PSK mode.
Answer: FALSE
23) The Wi-Fi Alliance refers to 802.1X mode as ________ mode.
- A) AES
- B) PSK
- C) enterprise
- D) EAP
Answer: A
24) 802.1X needs security between the authenticator and the computer in ________.
- A) Ethernet
- B) 802.11i
- C) Both A and B
- D) Neither A nor B
Answer: B
25) 802.1X needs security between the authenticator and the computer in Ethernet.
Answer: FALSE
26) 802.1X needs security between the authenticator and the computer in 802.11 wireless access.
Answer: FALSE
27) The most popular standard for extended 802.1X security is ________.
- A) EAP-TTLS
- B) MS-EAP
- C) EAP-TLS
- D) PEAP
Answer: D
28) In 802.11i ________, hosts must know a shared initial key.
- A) 802.1X mode
- B) PSK mode
- C) Both A and B
- D) Neither A nor B
Answer: B
29) PSK mode automatically prevents the use of weak keys.
Answer: FALSE
30) In 802.11i PSK mode, the pass phrase should be at least ________ characters long.
- A) 6
- B) 8
- C) 20
- D) 128
Answer: C
31) A notebook computer configured to act like a real access point is a(n) ________.
- A) evil twin access point
- B) rogue access point
Answer: A
32) A notebook computer configured to act like a real access point is a rogue access point.
Answer: FALSE
33) If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).
- A) one
- B) two
- C) four
- D) 16
Answer: B
34) Which of the following is usually set up by a hacker outside the building?
- A) A rogue access point.
- B) An evil twin access point.
- C) Both A and B
- D) Neither A nor B
Answer: B
35) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
- A) VLANs.
- B) VPNs.
- C) PEAP.
- D) All of the above
Answer: B
36) In VPNs designed to frustrate evil twin attacks, the shared secret ________.
- A) is transmitted in the clear
- B) is transmitted with cryptographic protections
- C) is not transmitted
- D) Any of the above
Answer: C
37) WPS is applicable to ________.
- A) 802.1X mode
- B) Preshared key mode
- C) PEAP
- D) IPsec
Answer: B
38) Which of the following has a dangerous vulnerability that is causing problems today?
- A) PEAP
- B) 802.11i
- C) WPA
- D) WPS
Answer: A
39) A denial-of-service attack against a wireless network can be implemented by ________.
- A) flooding the network with traffic
- B) sending disassociate commands to clients
- C) Both A and B
- D) Neither A nor B
Answer: C
40) Initial WLAN planning begins with drawing circles on building architecture drawings.
Answer: TRUE
41) Centralized access point management ________.
- A) increases management costs but provides better control
- B) reduces management costs
Answer: B
42) Centralized access point management raises management costs.
Answer: FALSE
43) Which of the following can be used to centrally manage remote access points?
- A) Smart access points.
- B) WLAN switches.
- C) Both A and B
- D) Neither A nor B
Answer: C
44) Managed access points should ________.
- A) allow access point power to be adjusted remotely
- B) provide constant transmission quality monitoring
- C) Both A and B
- D) Neither A nor B
Answer: C
45) Managed access points should ________.
- A) identify rogue access points
- B) be able to push updates out to access points
- C) Both A and B
- D) Neither A nor B
Answer: C
46) An 8/1 increase in power corresponds to approximately ________ decibels.
- A) 3
- B) 6
- C) 20
- D) None of the above
Answer: D
47) A 100/1 increase in power corresponds to approximately ________ decibels.
- A) 6
- B) 10
- C) 20
- D) None of the above
Answer: C
48) An 8/1 decrease in power corresponds to approximately ________ decibels.
- A) 3
- B) 6
- C) 9
- D) None of the above
Answer: D
49) 1 Watt represents a dBm value of about ________.
- A) 10
- B) 20
- C) 30
- D) We cannot say because only one power is given.
Answer: C
50) 2 mW represents a dBm value of about ________.
- A) 2
- B) 3
- C) 20
- D) We cannot say because only one power is given.
Answer: B
51) I wish to have a wireless LAN to serve my house. I will use ________.
- A) 802.11
- B) Bluetooth
- C) Either A or B
Answer: A
52) Bluetooth is for ________.
- A) large WLANs
- B) cable replacement
- C) Both A and B
- D) Neither A nor B
Answer: B
53) Which of the following was created for PANs?
- A) 802.11
- B) Bluetooth
- C) Both A and B
- D) Neither A nor B
Answer: C
54) Bluetooth is standardized by the ________.
- A) 802.11 Working Group
- B) Wi-Fi Alliance
- C) Bluetooth Special Interest Group
- D) None of the above
Answer: C
55) Which form of Bluetooth has a typical transmission speed of about 200 kbps?
- A) Classic Bluetooth.
- B) High-Speed Bluetooth.
- C) Low-Energy Bluetooth.
- D) None of the above
Answer: C
56) Which form of Bluetooth has a typical transmission speed of about 3 Mbps?
- A) Classic Bluetooth.
- B) High-Speed Bluetooth.
- C) Low-Energy Bluetooth.
- D) None of the above
Answer: A
57) Which form of Bluetooth has a typical transmission speed of about 24 Mbps?
- A) Classic Bluetooth.
- B) High-Speed Bluetooth.
- C) Low-Energy Bluetooth.
- D) None of the above
Answer: B
58) Which of the following can use access points?
- A) 802.11
- B) Bluetooth
- C) Both A and B
- D) Neither A nor B
Answer: A
59) In Bluetooth, a master may have multiple slaves.
Answer: TRUE
60) At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master?
- A) The Bluetooth phone.
- B) The Bluetooth headset.
- C) Both are simultaneously masters and slaves.
Answer: B
61) In Bluetooth, a master can have up to ________ slaves at any moment.
- A) 1
- B) 3
- C) 12
- D) None of the above
Answer: D
62) Two Bluetooth devices will peer ________.
- A) the first time they connect
- B) every time they connect
- C) never
- D) after they have first bonded
Answer: A
63) Two devices exchange information about the profiles they support during ________.
- A) peering
- B) bonding
- C) Both A and B
- D) Neither A nor B
Answer: A
64) Which Bluetooth profile would a tablet use with a Bluetooth keyboard?
- A) Bluetooth input profile.
- B) Bluetooth I/O profile.
- C) Human interface device profile.
- D) None of the above
Answer: C
65) A mobile phone may communicate a headset using the Bluetooth ________ profile.
- A) hands-free
- B) headset
- C) Both A and B
- D) Neither A nor B
Answer: C
66) A mobile phone will communicate with more functionality with a headset if it uses the Bluetooth ________.
- A) hands-free profile
- B) headset profile
- C) Both have about equal functionality.
Answer: A
67) Bluetooth uses the ________ service band.
- A) 2.4 GHz
- B) 5 GHz
- C) Both A and B
- D) Neither A nor B
Answer: A
68) Classic Bluetooth uses ________.
- A) OFDM
- B) Frequency Hopping Spread Spectrum
- C) Both A and B
- D) Neither A nor B
Answer: B
69) Near-field communication has a maximum transmission distance of about ________.
- A) 400 cm / 200 in
- B) 40 cm / 20 in
- C) 4 cm / 2 in
- D) The devices must be physically touching.
Answer: C
70) In which frequency band can NFC operate?
- A) 2.4 GHz.
- B) 5 GHz.
- C) Both A and B
- D) Neither A nor B
Answer: D
71) A typical speed for NFC is about ________.
- A) 2 kbps
- B) 200 kbp
- C) 2 Mbps
- D) 200 Mbps
Answer: B
72) Passive RFID chips are powered by ________.
- A) a battery
- B) the sun
- C) body temperature
- D) the signal sent by the device querying the RFID chip
Answer: A
73) Hackers cannot eavesdrop on near-field communication transmissions unless they are almost right next to the device.
Answer: FALSE
74) UWB channels are wider than a full service band.
Answer: TRUE
75) Compared to 802.11, UWB has greater ________.
- A) speed
- B) transmission distance
- C) reliability
- D) All of the above
Answer: A