Вы находитесь на странице: 1из 53

UNIT4 -WCN MCQS

This set of Computer Networks Multiple Choice Questions & Answers (MCQs)
focuses on “Wireless LAN”.

1. What is the access point (AP) in a wireless LAN?

a) device that allows wireless devices to connect to a wired network

b) wireless devices itself

c) both device that allows wireless devices to connect to a wired network and
wireless devices itself

d) all the nodes in the network

View Answer

Answer: a

Explanation: Access point in a wireless network is any device that will allow the
wireless devices to a wired network. A router is the best example of an Access
Point.

2. In wireless ad-hoc network _________

a) access point is not required

b) access point is must

c) nodes are not required

d) all nodes are access points

View Answer

Answer: a

Explanation: An ad-hoc wireless network is a decentralized kind of a wireless


network. An access point is usually a central device and it would go against the
rules of the ad-hoc network to use one. Hence it is not required.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless
LAN?

a) CDMA

b) CSMA/CA

c) ALOHA

d) CSMA/CD

View Answer

Answer: b

Explanation: CSMA/CA stands for Carrier-sense multiple access/collision


avoidance. It is a multiple access protocol used by IEEE 802.11 standard for
wireless LAN. It’s based on the principle of collision avoidance by using different
algorithms to avoid collisions between channels.

4. In wireless distribution system __________

a) multiple access point are inter-connected with each other

b) there is no access point

c) only one access point exists

d) access points are not required

View Answer

Answer: a

Explanation: A Wireless Distribution System allows the connection of multiple


access points together. It is used to expand a wireless network to a larger network.

5. A wireless network interface controller can work in _______

a) infrastructure mode

b) ad-hoc mode

c) both infrastructure mode and ad-hoc mode


d) WDS mode

View Answer

Answer: c

Explanation: A wireless network interface controller works on the physical layer


and the data link layer of the OSI model. Infrastructure mode WNIC needs access
point but in ad-hoc mode access point is not required.

6. In wireless network an extended service set is a set of ________

a) connected basic service sets

b) all stations

c) all access points

d) connected access points

View Answer

Answer: a

Explanation: The extended service set is a part of the IEEE 802.11 WLAN
architecture and is used to expand the range of the basic service set by allowing
connection of multiple basic service sets.

7. Mostly ________ is used in wireless LAN.

a) time division multiplexing

b) orthogonal frequency division multiplexing

c) space division multiplexing

d) channel division multiplexing

View Answer

Answer: b
Explanation: In orthogonal frequency division multiplexing, digital data is encoded
on multiple carrier frequencies. It is also used in digital television and audio
broadcasting in addition to Wireless LANs.

8. Which one of the following event is not possible in wireless LAN?

a) collision detection

b) acknowledgement of data frames

c) multi-mode data transmission

d) connection to wired networks

View Answer

Answer: a

Explanation: Collision detection is not possible in wireless LAN with no extensions.


Collision detection techniques for multiple access like CSMA/CD are used to
detect collisions in Wireless LANs.

9. What is Wired Equivalent Privacy (WEP)?

a) security algorithm for ethernet

b) security algorithm for wireless networks

c) security algorithm for usb communication

d) security algorithm for emails

View Answer

Answer: b

Explanation: WEP is a security algorithm for wireless network which intended to


provide data confidentiality comparable to that of traditional wired networks. It was
introduced in 1997.

10. What is WPA?

a) wi-fi protected access


b) wired protected access

c) wired process access

d) wi-fi process access

View Answer

Answer: a

Explanation: WPA or WiFi Protected Access is a security protocol used to provide


users and firms with strong data security and protection for their wireless networks
(WiFi) to give them confidence that only authorized users can access their networ

Which scheme/ strategy is suitable to establish the communication between the


access point (AP) and the infrastructure of LANs?

a. Wired

b. Wireless

c. Both a & b

d. Cannot Predict

View Answer / Hide Answer

ANSWER: a. Wired
What conclusion can be drawn if the collision is detected in CSMA/CD algorithm
while controlling the access in wireless LANs?

a. Non-reception of frame & necessity of retransmission


b. No necessity of working in duplex mode for the host
c. No necessity to prevent the signal fading
d. All of the above

View Answer / Hide Answer

ANSWER: a. Non-reception of frame & necessity of retransmission

This set of Wireless & Mobile Communications Multiple Choice Questions & Answers
(MCQs) focuses on “Wireless Local Area Networks (WLANs)”.

1. What is the full form of WLAN?

a) Wide Local Area Network

b) Wireless Local Area Network

c) Wireless Land Access Network

d) Wireless Local Area Node

View Answer

Answer: b

Explanation: WLAN stands for Wireless Local Area Network. Wireless networks is
increasingly used as a replacement for wires within homes, buildings, and office
settings through the deployment of wireless local area networks (WLANs).

2. WLANs use high power levels and generally require a license for spectrum use. (True
or False)

a) True
b) False

View Answer

Answer: b

Explanation: WLANs use low power and generally do not require a license for
spectrum. They provide ad hoc high data transmission rate connections deployed by
individuals. In the late 1980s, FCC provided licence free bands for low power spread
spectrum devices in ISM band, which is used by WLAN.

3. What is the name of 300 MHz of unlicensed spectrum allocated by FCC in ISM band?

a) UNII

b) Unlicensed PCS

c) Millimetre wave

d) Bluetooth

View Answer

Answer: a

Explanation: FCC allocated 300 MHz of unlicensed spectrum in the ISM bands. This
allocation is called the Unlicensed National Information Infrastructure (UNII) band. It
was allocated for the express purpose of supporting low power license free spread
spectrum data communication.

4. Which of the following specifies a set of media access control (MAC) and physical
layer specifications for implementing WLANs?

a) IEEE 802.16
b) IEEE 802.3

c) IEEE 802.11

d) IEEE 802.15

View Answer

Answer: c

Explanation: IEEE 802.11 is a set of media access control and physical layer
specification for implementing WLAN computer communication. It was founded in
1987 to begin standardization of spread spectrum WLANs for use in the ISM bands.

5. Which of the following is not a standard of WLAN?

a) HIPER-LAN

b) HIPERLAN/2

c) IEEE 802.11b

d) AMPS

View Answer

Answer: d

Explanation: AMPS is a standard of first generation network. HIPERLAN is a WLAN


standard developed in Europe in mid 1990s. HIPERLAN/2 is also developed in
Europe that provides upto 54 Mbps of user data.

6. Which of the following is the 802.11 High Rate Standard?


a) IEEE 802.15

b) IEEE 802.15.4

c) IEEE 802.11g

d) IEEE 802.11b

View Answer

Answer: d

Explanation: IEEE 802.11b was a high rate standard approved in 1999. It provided
new data rate capabilities of 11 Mbps, 5.5 Mbps in addition to the original 2 Mbps and
1 Mbps user rates of IEEE 802.11.

7. Which of the following spread spectrum techniques were used in the original IEEE
802.11 standard?

a) FHSS and DSSS

b) THSS and FHSS

c) THSS and DSSS

d) Hybrid technique

View Answer

Answer: a

Explanation: Original IEEE 802.11 used both the approaches of FHSS (Frequency
Hopping Spread Spectrum) and DSSS (Direct Sequence Spread Spectrum). But from
late 2001s, only DSSS modems are used within IEEE 802.11.
8. Which of the following WLAN standard has been named Wi-Fi?

a) IEEE 802.6

b) IEEE 802.15.4

c) DSSS IEEE 802.11b

d) IEEE 802.11g

View Answer

Answer: c

Explanation: The DSSS IEEE 802.11b standard has been named Wi-Fi by the
Wireless Ethernet Compatibility Alliance. It is a group that promotes adoption of
802.11 DSSS WLAN.

9. Which of the following is developing CCK-OFDM?

a) IEEE 802.11a

b) IEEE 802.11b

c) IEEE 802.15.4

d) IEEE 802.11g

View Answer

Answer: d

Explanation: IEEE 802.11g is developing CCK-OFDM (Complimentary Code Keying


Orthogonal Frequency Division Multiplexing) standards. It will support roaming
capabilities and dual band use for public WLAN networks. It also has backward
compatibility with 802.11b technologies.

10. What is the data rate of HomeRF 2.0?

a) 10 Mbps

b) 54 Mbps

c) 200 Mbps

d) 1 Mbps

View Answer

Answer: a

Explanation: HomeRF 2.0 has data rate of the order of 10 Mbps. The FHSS
proponents of IEEE 802.11 have formed the HomeRF standard that supports the
frequency hopping equipment. In 2001, HomeRF developed a 10 Mbps FHSS
standard called HomeRF 2.0.

11. HIPER-LAN stands for ______

a) High Precision Radio Local Area Network

b) High Performance Radio Local Area Network

c) High Precision Radio Land Area Network

d) Huge Performance Radio Link Access Node

View Answer

Answer: b
Explanation: HIPER-LAN stands for High Performance Radio Local Area Network. It
was developed in Europe in mid 1990s. It was intended to provide individual wireless
LANs for computer communication.

12. What is the range of asynchronous user data rates provided by HIPER-LAN?

a) 1-100 Mbps

b) 50-100 Mbps

c) 1-20 Mbps

d) 500 Mbps to 1 Gbps

View Answer

Answer: c

Explanation: HIPER-LAN provides asynchronous user data rates of between 1 to 20


Mbps, as well as time bounded messaging of rates of 64 kbps to 2.048 Mbps. It uses
5.2 GHz and 17.1 GHz frequency bands.

13. What is the name of the European WLAN standard that provides user data rate upto
54 Mbps?’

a) UNII

b) WISP

c) MMAC

d) HIPERLAN/2

View Answer
Answer: d

Explanation: HIPERLAN/2 has emerged as the next generation European WLAN


standard. It provides upto 54 Mbps of user data to a variety of networks. The networks
includes the ATM backbone, IP based networks and the UMTS network.

14. What is WISP?

a) Wideband Internet Service Protocol

b) Wireless Internet Service Provider

c) Wireless Instantaneous Source Provider

d) Wideband Internet Source Protocol

View Answer

Answer: b

Explanation: WISP is wireless Internet Service Provider used to explore public LANs
(publan). It builds a nationwide infrastructure of WLAN access points in selected
hotels, restaurants or airports. It then charges a monthly subscription fee to users who
wish to have always on Internet access in those selected locations.

15. The price of WLAN hardware is more than 3G telephones and fixed wireless
equipment.(True or False)

a) True

b) False

View Answer
Answer: b

Explanation: As, WLAN could be used to provide access for the last 100 meters into
homes and businesses. Therefore, the price of WLAN hardware is far below 3G
telephones and fixed wireless equipment.

4. Which among the following represents the building blocks of wireless LANs?

a. BSS

b. ESS

c. Both a & b

d. None of the above

View Answer / Hide Answer

ANSWER: a. BSS

This set of Wireless & Mobile Communications Multiple Choice Questions & Answers
(MCQs) focuses on “Introduction to Multiple Access”.

1. Multiple access schemes are used to allow ____ mobile users to share
simultaneously a finite amount of radio spectrum.

a) Many

b) One
c) Two

d) Ten-Fifteen

View Answer

Answer: a

Explanation: Multiple access schemes are used to allow many mobile users to share
simultaneously a finite amount of radio spectrum. The sharing of spectrum is required
to achieve high capacity by simultaneously allocating the available bandwidth to
multiple users.

2. The technique that makes possible the task of listening and talking in communication
system is called ________

a) Simplexing

b) Duplexing

c) Modulating

d) Multiple access technique

View Answer

Answer: b

Explanation: In conventional telephone systems, it is possible to talk and listen


simultaneously. This effect is called duplexing and is generally required in wireless
telephone systems.

3. Frequency division duplexing provides ____ distinct bands of frequencies for _____
user.
a) Two, two

b) One, two

c) Two, one

d) Two, many

View Answer

Answer: c

Explanation: Frequency division duplexing (FDD) provides two distinct bands of


frequencies for every user. In FDD, any duplex channel actually consists of two
simplex channels.

4. The forward band in FDD provides traffic from the mobile to base station.

a) True

b) False

View Answer

Answer: b

Explanation: The forward band in FDD provides traffic from the base station to the
mobile. The reverse band provides traffic from the mobile to the base station.

5. The frequency separation between each forward and reverse channel changes
throughout the system.

a) True
b) False

View Answer

Answer: b

Explanation:The frequency separation between each forward and reverse channel is


constant throughout the system. It is regardless of the particular channel being used.
A device called a duplexer is used inside each subscriber unit and base station to
allow simultaneous bidirectional radio transmission.

6. Time division duplexing uses ____ to provide both a forward and reverse link.

a) Frequency

b) Time

c) Time and frequency

d) Cell spacing

View Answer

Answer: b

Explanation: Time division duplexing (TDD) uses time instead of frequency to provide
both a forward and reverse link. In TDD, multiple users share a single radio channel
by taking turns in the time domain.

7. TDD is effective for _____

a) Fixed wireless access and users are stationary

b) Dynamic wireless access and users are stationary


c) Fixed wireless access and users are moving

d) Dynamic wireless access and users are moving

View Answer

Answer: a

Explanation: TDD is effective for fixed wireless access when all users are stationary.
This makes the propagation delay does not vary in time among the users. Because of
rigid timing required for time slotting, TDD generally is limited to cordless phone or
short range potable access.

8. In wideband systems, the transmission bandwidth of a single channel _____


coherence bandwidth of the channel.

a) Equal to

b) Not related to

c) Larger than

d) Smaller than

View Answer

Answer: c

Explanation: In wideband systems, the transmission bandwidth of a single channel is


much larger than the coherence bandwidth of the channel. Thus, multipath fading
does not greatly vary the received signal power within a wideband channel.

9. In narrowband system, the channels are usually operated using TDD.


a) True

b) False

View Answer

Answer: b

Explanation: In narrowband system, channels are usually operated using FDD. To


minimize interference between forward and reverse links on each channel, the
frequency separation is made as great as possible within the frequency spectrum.

10. Narrowband FDMA allows users to share the same radio channel allocating a unique
time slot to each user.

a) True

b) False

View Answer

Answer: b

Explanation: In narrowband FDMA, a user is assigned a particular channel which is


not shared by other users in the vicinity. However narrowband TDMA allows the users
to share the same radio channel allocating a unique time slot to each user.

This set of Wireless & Mobile Communications Multiple Choice Questions & Answers
(MCQs) focuses on “Frequency Division Multiple Access (FDMA)”.

1. Frequency division multiple access (FDMA) assigns ______ channels to _______


users.

a) Individual, individual
b) Many, individual

c) Individual, many

d) Many, many

View Answer

Answer: a

Explanation: Frequency division multiple access (FDMA) assigns individual channels


to individual users. Each user is allocated a unique frequency band or channel. These
channels are assigned on demand to users who request service.

2. During the period of call, other users can share the same channel in FDMA. State
whether True or False.

a) True

b) False

View Answer

Answer: b

Explanation: In FDMA systems, no other user can share the same channel during the
period of call. In FDD systems, the users are assigned a channel as a pair of
frequencies; one is used for the forward channel while the other frequency is used for
the reverse channel.

3. The FDMA channel carries ____ phone circuit at a time.

a) Ten
b) Two

c) One

d) Several

View Answer

Answer: c

Explanation: The FDMA channel carries one phone circuit at a time. Each individual
band or channel is wide enough to accommodate the signal spectra of the
transmissions to be propagated.

4. If the FDMA channel is not in use, it can be used by other users. State whether True
or False.

a) True

b) False

View Answer

Answer: b

Explanation: If an FDMA channel is not in use, the it sits idle and cannot be used by
other users to increase or share capacity. It is essentially a wasted resource.

5. The bandwidth of FDMA channel is ______

a) Wide

b) Narrow
c) Large

d) Zero

View Answer

Answer: b

Explanation: The bandwidth of FDMA channels is relatively narrow as each channel


supports only one circuit per carrier. That is, FDMA is usually implemented in narrow
band systems.

6. The symbol time in FDMA systems is _________ thus intersymbol interference is


______

a) Large, high

b) Small, low

c) Small, high

d) Large, low

View Answer

Answer: d

Explanation: The symbol time of a narrowband signal is large as compared to the


average delay spread. This implies that the amount of intersymbol interference is low
and, thus, little or no equalization is required in FDMA narrowband systems.

7. Due to _________ transmission scheme, ______ bits are needed for overhead in
FDMA systems.
a) Continuous, few

b) Discontinuous, few

c) Continuous, many

d) Discontinuous, many

View Answer

Answer: a

Explanation: Since FDMA is a continuous transmission scheme, fewer bits are needed
for overhead purposes (such as synchronization and framing bits) as compared to
TDMA.

8. Which of the following is not true for FDMA systems as compared to TDMA systems?

a) Low complexity

b) Lower cell site system cost

c) Tight RF filtering

d) Narrow bandwidth

View Answer

Answer: b

Explanation: FDMA systems have higher cell site system costs as compared to TDMA
systems. It is due to single channel per carrier design, and the need to use costly
bandpass filters to eliminate spurious radiation at the base station.
9. __________ is undesired RF radiation.

a) Intermodulation frequency

b) Intermediate frequency

c) Instantaneous frequency

d) Instrumental frequency

View Answer

Answer: a

Explanation: Intermodulation (IM) frequency is undesired RF radiation which can


interfere with other channels in the FDMA systems. The nonlinearities cause signal
spreading in the frequency domain and generate IM frequency.

10. ______ is based on FDMA/FDD.

a) GSM

b) W-CDMA

c) Cordless telephone

d) AMPS

View Answer

Answer: d

Explanation: The first US analog cellular system, the Advanced Mobile Phone System
(AMPS) is based on FDMA/FDD. A single user occupies a single channel while the
call is in progress.
11. In US AMPS, 416 channels are allocated to various operators with 10 kHz guard
band and channel between them is 30 kHz. What is the spectrum allocation given to
each operator?

a) 12.5 kHz

b) 30 kHz

c) 12.5 MHz

d) 30 MHz

View Answer

Answer: c

Explanation: Spectrum allocated to each cellular operator is 12.5 MHz. As


Bt=NBc+2Bguard; which is equal to 416*30*103+2(10*103) =12.5 MHz.

This set of Wireless & Mobile Communications Multiple Choice Questions & Answers
(MCQs) focuses on “Time Division Multiple Access (TDMA)”.

1. TDMA systems transmit in a continuous way.

a) True

b) False

View Answer

Answer: b

Explanation: TDMA systems transmit data in a buffer and burst method. Thus, the
transmission for any user is not continuous.
2. Preamble contains _____

a) Address

b) Data

c) Guard bits

d) Trail bits

View Answer

Answer: a

Explanation: TDMA frame is made up of a preamble, an information message and the


trail bits. In a TDMA frame, the preamble contains the address and synchronization
information that both the base station and the subscribers use to identify each other.

3. _____ are utilized to allow synchronization of the receivers between different slots and
frames.

a) Preamble

b) Data

c) Guard bits

d) Trail bits

View Answer

Answer: c
Explanation: Guard times are utilized to allow synchronization of the receivers
between different slots and frames. TDMA/FDD systems intentionally induce several
time slots of delay between the forward and reverse time slots for a particular user.

4. Which of the following is not true for TDMA?

a) Single carrier frequency for single user

b) Discontinuous data transmission

c) No requirement of duplexers

d) High transmission rates

View Answer

Answer: a

Explanation: TDMA share a single carrier frequency with several users, where each
user makes use of non-overlapping time slots. The number of time slots per frame
depends on several factors, such as modulation technique, available bandwidth etc.

5. Because of _______ transmissions in TDMA, the handoff process in _____

a) Continuous, complex

b) Continuous, simple

c) Discontinuous, complex

d) Discontinuous, simple

View Answer

Answer: d
Explanation: Because of discontinuous transmissions in TDMA, the handoff process is
much simpler for a subscriber unit, since it is able to listen for other base stations
during idle time slots.

6. _____ synchronization overhead is required in TDMA due to _______ transmission.

a) High, burst

b) High, continuous

c) Low, burst

d) No, burst

View Answer

Answer: a

Explanation: High synchronization overhead is required in TDMA systems because of


burst transmissions. TDMA transmissions are slotted, and this requires the receivers
to be synchronized for each data burst.

7. TDMA allocates a single time per frame to different users.

a) True

b) False

View Answer

Answer: b
Explanation: TDMA has an advantage that it can allocate different numbers of time
slots per frame to different users. Thus, bandwidth can be supplied on demand to
different users by concatenating or reassigning time slots based on priority.

8. ______ of TDMA system is a measure of the percentage of transmitted data that


contains information as opposed to providing overhead for the access scheme.

a) Efficiency

b) Figure of merit

c) Signal to noise ratio

d) Mean

View Answer

Answer: a

Explanation: Efficiency of TDMA system is a measure of the percentage of transmitted


data that contains information as opposed to providing overhead for the access
scheme. The frame efficiency is the percentage of bits per frame which contain
transmitted data.

9. A TDMA system uses 25 MHz for the forward link, which is broken into radio channels
of 200 kHz. If 8 speech channels are supported on a single radio channel, how many
simultaneous users can be accommodated?

a) 25

b) 200

c) 1600
d) 1000

View Answer

Answer: d

Explanation: For a TDMA system that uses 25 MHz for the forward link, which is
broken into radio channels of 200 kHz. If 8 speech channels are supported on a single
radio channel, 1000 simultaneous users can be accommodated as N=(25 MHz)/(200
kHz/8).

10. What is the time duration of a bit if data is transmitted at 270.833 kbps in the
channel?

a) 270.833 s

b) 3 μs

c) 3.692 μs

d) 3.692 s

View Answer

Answer: c

Explanation: If data is transmitted at 270.833 kbps in the channel, the time duration of
a bit will be 3.692 μs, as Tb=(1/270.833 kbps)= 3.692 μs.

1. SSMA uses signals which have a transmission bandwidth that is smaller than the
minimum required RF bandwidth.

a) True
b) False

View Answer

Answer: b

Explanation: Spread spectrum multiple access (SSMA) uses signals which have a
transmission bandwidth that is several orders of magnitude greater than the minimum
required RF bandwidth.

2. PN sequence converts _______ signal to ______ signal.

a) Narrowband, wideband

b) Wideband, narrowband

c) Unmodulated, modulated

d) Low frequency, high frequency

View Answer

Answer: a

Explanation: A pseudo-noise (PN) sequence converts a narrowband signal to a


wideband noise like signal before transmission. SSMA provides immunity to multipath
interference and robust multiple access capability.

11. _______ arises from the fact that the spreading sequences of different users are not
orthogonal.

a) Near-far problem

b) Line of sight
c) Windowing

d) Self jamming

View Answer

Answer: d

1. IEEE has defined the specifications for a wireless LAN, called _______, which
covers the physical and data link layers.

A) IEEE 802.3 B) IEEE 802.5 C) IEEE 802.11 D) IEEE 802.2

2. In IEEE 802.11, a ___ is made of stationary or mobile wireless stations and an


optional central base station, known as the access point (AP). A) ESS B) BSS C) CSS
D) none of the above

3. In IEEE 802.11, a BSS without an AP is called an _________. A) an ad hoc


architecture B) an infrastructure network C) either (a) or (b) D) neither (a) nor (b)

4. In IEEE 802.11, a BSS with an AP is sometimes referred to as ____________.

A) an ad hoc architecture B) an infrastructure network C) either (a) or (b) D) neither


(a) nor (b)

5. In IEEE 802.11, communication between two stations in two different BSSs usually
occurs via two ________. A) BSSs B) ESSs C) APs D) none of the above

6. In IEEE 802.11, a station with ________ mobility is either stationary (not moving) or
moving only inside a BSS. A) no-transition B) BSS-transition C) ESS-transition D) none
of the above
7. In IEEE 802.11, a station with ________mobility can move from one BSS to another,
but the movement is confined inside one ESS. A) no-transition B) BSS-transition C)
ESS-transition D) none of the above

8. In IEEE 802.11, a station with ________ mobility can move from one ESS to another.
A) no-transition B) BSS-transition C) ESS-transition D) none of the above

9. In IEEE 802.11, _______ is an optional access method that can be implemented in an


infrastructure network (not in an ad hoc network). A) DCF B) PCF C) either (a) or (b) D)
neither (a) nor (b)

10. In IEEE 802.11, when a frame is going from one station in a BSS to another without
passing through the distribution system, the address flag is _____ A) 00 B) 01 C) 10 D)
11

11. In IEEE 802.11, when a frame is coming from an AP and going to a station, the
address flag is _______. A) 00 B) 01 C) 10 D) 11

12. In IEEE 802.11, when a frame is going from a station to an AP, the address flag is
_____. A) 00 B) 01 C) 10 D) 11

13. In IEEE 802.11, when a frame is going from one AP to another AP in a wireless
distribution system, the address flag is _____ A) 00 B) 01 C) 10 D) 11

14. The IEEE 802.11 standard for wireless LANs defines two services: ______ and
_______. A) BSS; ASS B) ESS; SSS C) BSS; ESS D) BSS; DCF

15. In IEEE 802.11, the access method used in the DCF sublayer is _________. A)
ALOHA B) CSMA/CA C) CSMA/CD D) none of the above

16. In IEEE 802.11, the access method used in the PCF sublayer is ______. A)
contention B) controlled C) polling D) none of the above

17. In IEEE 802.11, the ______ is a timer used for collision avoidance. A) NAV B) BSS
C) ESS D) none of the above

18. In IEEE 802.11, the MAC layer frame has ______ fields. A) four B) five C) six D)
none of the above
19. In IEEE 802.11, the addressing mechanism can include up to ______addresses. A)
four B) five C) six D) none of the above

20. The original IEEE 802.11, uses _________. A) FHSS B) DSSS C) OFDM D) either
(a) or (b)

21. The IEEE 802.11a, uses _________. A) FHSS B) DSSS C) OFDM D) either (a) or
(b)

22. The IEEE 802.11b, uses _________. A) FHSS B) DSSS C) OFDM D) either (a) or
(b)

23. The IEEE 802.11g, uses _________. A) FHSS B) DSSS C) OFDM D) either (a) or
(b)

24. The original IEEE 802.11, has a data rate of _____Mbps. A) 1 B) 6 C) 11 D) 22

25. IEEE 802.11a, has a data rate of _____Mbps. A) 1 B) 2 C) 6 D) none of the above
26. IEEE 802.11b, has a data rate of _____Mbps. A) 1 B) 2 C) 5.5 D) none of the above
27. IEEE 802.11g, has a data rate of _____Mbps. A) 1 B) 2 C) 11 D) 22

28. The IEEE 802.11 wireless LANs use ________ types of frames. A) four B) five C) six
D) none of the above

1. What is the frequency range of the IEEE 802.11a standard? A.2.4Gbps B.5Gbps
C.2.4GHz D.5GHz

2. What is the maximum distance running the lowest data rate for 802.11b?

A. About 100 feet B. About 175 feet C. About 300 feet D. About 350 feet

3. What is the maximum distance with maximum data rate for 802.11a? A. About 65-75
feet B. About 90-100 feet C. About 150 feet D. Over 200 feet

4. What is the frequency range of the IEEE 802.11b standard? A.2.4Gbps B.5Gbps
C.2.4GHz D.5GHz
Which of the following is ________________algorithm to secure IEEE 802.11
wireless networks?
Options
- Wiredless Equivalent Privacy (WEP)
- Wired Equivalent Privacy (WEP)
- Wired Extended Privacy (WEP)
- none of these

CORRECT ANSWER : Wired Equivalent Privacy (WEP)

1. ____________________ is the anticipation of unauthorized access or break to


computers or data by means of wireless networks.

a) Wireless access

b) Wireless security

c) Wired Security

d) Wired device apps

View Answer

Answer: b

Explanation: Wireless security is the anticipation of unauthorized access or breaks to


computers or data by means of wireless networks. The most widespread types of
wireless securities are Wired Equivalent Privacy (WEP), Wi-Fi Protected Access
(WPA), WPA2 and recently released WPA3.

2. Which among them has the strongest wireless security?

a) WEP

b) WPA

c) WPA2

d) WPA3

View Answer

Answer: d

Explanation: The most extensive types of wireless securities are Wired Equivalent
Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and WPA3. WPA3 is the
strongest and recently released.

3. Which among the following is the least strong security encryption standard?

a) WEP
b) WPA

c) WPA2

d) WPA3

View Answer

Answer: a

Explanation: A prime branch of cyber-security is wireless security. The most


widespread types of wireless securities are Wired Equivalent Privacy (WEP), Wi-Fi
Protected Access (WPA), WPA2 and WPA3. WEP is notoriously weak encryption
standard.

4. _________ is an old IEEE 802.11 standard from the year 1999.

a) WPA2

b) WPA3

c) WEP

d) WPA

View Answer

Answer: c

Explanation: The most widespread types of wireless securities are Wired Equivalent
Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and WPA3. WEP is an old
IEEE 802.11 standard from the year 1999.

5. _______________ is the central node of 802.11 wireless operations.

a) WPA

b) Access Point

c) WAP

d) Access Port

View Answer
Answer: b

Explanation: The central node of 802.11 wireless operations is the Access Point (AP).
It is that interface which acts as an intermediary of a wired & wireless network; and all
the associated wireless clients’ use this to exchange data with it.

6. AP is abbreviated as _____________

a) Access Point

b) Access Port

c) Access Position

d) Accessing Port

View Answer

Answer: a

Explanation: The central node of 802.11 is that interface which acts as an


intermediary of a wired & wireless network; and all the associated wireless clients’ use
this and exchange data.

7. ___________________ is alike as that of Access Point (AP) from 802.11, & the
mobile operators uses it for offering signal coverage.

a) Base Signal Station

b) Base Transmitter Station

c) Base Transceiver Station

d) Transceiver Station

View Answer

Answer: c

Explanation: Base Transceiver Station (BTS) which is also known as a base station
(BS) or radio base station (RBS) is alike as that of Access Point (AP) from 802.11, &
the mobile operators use it for offering signal coverage.

8. BTS stands for ___________________


a) Basement Transceiver Server

b) Base Transmitter Station

c) Base Transceiver Server

d) Base Transceiver Station

View Answer

Answer: d

Explanation: Base Transceiver Station is a section of equipment which facilitates


wireless communication from 802.11 & the mobile operators use it for offering signal
coverage. Examples are GSM, 3G, 4G etc.

9. There are __________ types of wireless authentication modes.

a) 2

b) 3

c) 4

d) 5

View Answer

Answer: a

Explanation: There are 2 achievable authentication types or schemes which are


implemented in the wireless security. These are Pre-Shared Key – based
authentication & Open Authentication.

10. When a wireless user authenticates to any AP, both of them go in the course of four-
step authentication progression which is called _____________

a) AP-handshaking

b) 4-way handshake

c) 4-way connection

d) wireless handshaking
View Answer

Answer: b

Explanation: When a wireless user authenticates to any AP, both of them go in the
course of four-step authentication progression which is called 4-way handshake.

11. WPS stands for __________________

a) WiFi Protected System

b) WiFi Protected Setup

c) WiFi Protocol Setup

d) Wireless Protected Setup

View Answer

Answer: b

Explanation: WPS stands for WiFi Protected Setup began to show up a few years
back on wireless access points as a new way of adding or connecting new devices to
the network by just pushing a key (within the router) & inserting the password.

12. It is recommended to use WPA2 or WPA3 encryption standard as they are strong
and more secure.

a) True

b) False

View Answer

Answer: a

Explanation: It is recommended to use WPA2 or WPA3 encryption standard as they


are strong and more secure. WPA2 & WPA3 characterizes the protocols a router &
Wi-Fi client devices use for performing “handshake” securely for communication.

13. ___________ is a process of wireless traffic analysis that may be helpful for forensic
investigations or during troubleshooting any wireless issue.

a) Wireless Traffic Sniffing


b) WiFi Traffic Sniffing

c) Wireless Traffic Checking

d) Wireless Transmission Sniffing

View Answer

Answer: a

Explanation: Wireless Traffic Sniffing is a process of analyzing wireless traffic that


may be helpful for forensic investigations or during troubleshooting any wireless issue.

14. Which of the following is a Wireless traffic Sniffing tool?

a) Maltego

b) BurpSuit

c) Nessus

d) Wireshark

View Answer

Answer: d

Explanation: The process of analyzing wireless traffic that may be helpful for forensic
investigations or during troubleshooting any wireless issue is called Wireless Traffic
Sniffing. Popular tools used in this case are Wireshark and Kismet.

15. ___________________ began to show up few years back on wireless access points
as a new way of adding or connecting new devices.

a) WPA2

b) WPA

c) WPS

d) WEP

View Answer

Answer: c
Explanation: WiFi Protected Setup (WPS) began to show up a few years back on
wireless access points as a new way of adding or connecting new devices to the
network by just pushing a key (within the router) & typing an eight-digit password on
the client device.

This set of Wireless & Mobile Communications Questions and Answers for Freshers
focuses on “Bluetooth and Personal Area Networks (PANs)”.

1. Which of the following is not an open standard?

a) Bluetooth

b) WWW

c) HTML

d) VPN

View Answer

Answer: d

Explanation: An open standard is a standard that is publicly available. It has various


rights to use associated with it. Bluetooth is an open standard that has been
embraced by over thousand manufacturers of electronic appliances. VPN (Virtual
Private Network) is a private network.

2. What is the nominal range of Bluetooth?

a) 1 Km

b) 10 m

c) 1 m

d) 10 Km

View Answer

Answer: b

Explanation: The power of the transmitter governs the range over which a Bluetooth
device can operate. Generally, Bluetooth devices are said to fall into one of three
classes. The most common kind is class 2, and it operates in 10 m range.
3. Bluetooth standard is named after ______

a) King Ronaldo Bluetooth

b) Pope Vincent Bluetooth

c) King Herald Bluetooth

d) Pope Francis Bluetooth

View Answer

Answer: c

Explanation: Bluetooth standard is named after King Harald Bluetooth. He was the
10th century Viking who united Denmark and Norway. The Bluetooth standard aims to
unify the connectivity chores of appliances within the personal workspace of an
individual.

4. Bluetooth operates in which band?

a) Ka Band

b) L Band

c) Ku Band

d) 2.4 GHz ISM Band

View Answer

Answer: d

Explanation: Bluetooth is a radio technology operating in 2.4 GHz frequency band.


Bluetooth is best suited for low-bandwidth applications like transferring sound data
with telephones (i.e. with a Bluetooth headset) or byte data with hand-held computers
(transferring files) or keyboard.

5. Which of the following scheme is used by Bluetooth?

a) Frequency hopping TDD scheme

b) Frequency hopping FDD scheme

c) DSSS TDD scheme


d) DSSS FDD scheme

View Answer

Answer: a

Explanation: Frequency hopping TDD (Time Division Duplexing) scheme is used by


Bluetooth. Frequency hopping provides a form of multiple access among co-located
devices in different piconets.

6. What is the range of time slot in Bluetooth?

a) 120 milliseconds

b) 625 microseconds

c) 577 microseconds

d) 5.7 seconds

View Answer

Answer: b

Explanation: Bluetooth uses a timeslot of 625 microseconds. A data channel hops


randomly 1600 times per second between 79 RF channels. Thus, each channel is
divided into time slots 625 microseconds.

7. Which modulation scheme is used by Bluetooth?

a) DQPSK

b) MSK

c) GFSK

d) BPSK

View Answer

Answer: c

Explanation: Bluetooth uses GFSK (Gaussian Frequency Shift Keying). When GFSK
is used for Bluetooth modulation, the frequency of the carrier is shifted to carry the
modulation. By doing this the Bluetooth modulation achieves a bandwidth of 1 MHz
with stringent filter requirements to prevent interference on other channels.

8. What is the channel symbol rate in Bluetooth for each user?

a) 270.833 Kbps

b) 1 Gbps

c) 100 Mbps

d) 1 Mbps

View Answer

Answer: d

Explanation: Each user in Bluetooth uses a radio channel symbol rate of 1 Mbps using
GFSK modulation. The frequency hopping scheme of each Bluetooth user is
determined from a cyclic code with a length of 1027-1.

9. What is the raw channel bit error rate of Bluetooth?

a) 10-3

b) 10-10

c) 103

d) 10-1

View Answer

Answer: a

Explanation: Bluetooth has a bit error rate (BER) of 10-3. Bluetooth uses a number of
forward error control (FEC) coding and automatic repeat request (ARR) schemes to
achieve this bit rate.

10. Which of the following standard committee specifies Bluetooth and other Personal
Area Networks (PAN)?

a) IEEE 802.11b

b) IEEE 802.15
c) IEEE 802.11g

d) IEEE 802.16

View Answer

Answer: b

Explanation: IEEE 802.15 standards committee is formed to provide an international


forum for developing Bluetooth and other PANs. PANs are used to interconnect
pocket PCs, personal digital assistants (PDAs), cell phones, light projectors and other
appliances

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Bluetooth”.

1. An interconnected collection of piconet is called ___________

a) scatternet

b) micronet

c) mininet

d) multinet

View Answer

Answer: a

Explanation: Piconet is the basic unit of a bluetooth system having a master node and
upto seven active slave nodes. A collection of piconets is called scatternet and a slave
node of a piconet may act as a master in a piconet that is part of the scatternet.

2. In a piconet, there can be up to ________ parked nodes in the network.

a) 63

b) 127

c) 255

d) 511

View Answer
Answer: c

Explanation: A slave node in a piconet can be instructed by the master node to go into
parked mode. Then the slave node enters the parked mode in which the node is not
disconnected from the network but is inactive unless the master wakes it up.

3. Bluetooth is the wireless technology for __________

a) local area network

b) personal area network

c) metropolitan area network

d) wide area network

View Answer

Answer: b

Explanation: Bluetooth is a wireless technology used to create a wireless personal


area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz
frequency band for transmission.

4. Bluetooth uses __________

a) frequency hopping spread spectrum

b) orthogonal frequency division multiplexing

c) time division multiplexing

d) channel division multiplexing

View Answer

Answer: a

Explanation: Frequency hopping spread spectrum is a method of transmitting radio


signals by rapidly changing the carrier frequency and is controlled by the codes known
to the sender and receiver only.

5. Unauthorised access of information from a wireless device through a bluetooth


connection is called _________
a) bluemaking

b) bluesnarfing

c) bluestring

d) bluescoping

View Answer

Answer: b

Explanation: Unauthorised access of information from a wireless device through a


bluetooth connection is called Bluesnarfing. It is done through exploiting the
vulnerabilities of the Bluetooth device to steal the transmitted information.

6. What is A2DP (advanced audio distribution profile)?

a) a bluetooth profile for streaming audio

b) a bluetooth profile for streaming video

c) a bluetooth profile for security

d) a bluetooth profile for file management

View Answer

Answer: a

Explanation: A2DP stands for Advanced Audio Distribution Profile is a transfer


standard use to transmit high definition audio through Bluetooth. It is mainly used in
Bluetooth speakers and wireless headphones.

7. In a piconet, one master device ________

a) can not be slave

b) can be slave in another piconet

c) can be slave in the same piconet

d) can be master in another piconet

View Answer
Answer: b

Explanation: In a scatternet, a slave node of one piconet may act as a master in a


piconet that is part of the scatternet. The scatternet uses this property to connect
many piconets together to create a larger network.

8. Bluetooth transceiver devices operate in ______ band.

a) 2.4 GHz ISM

b) 2.5 GHz ISM

c) 2.6 GHz ISM

d) 2.7 GHz ISM

View Answer

Answer: a

Explanation: Bluetooth operates on 2.45 GHz frequency ISM band for transmission. It
is used to create a wireless personal area network for data transfer up to a distance of
10 meters.

9. Bluetooth supports _______

a) point-to-point connections

b) point-to-multipoint connection

c) both point-to-point connections and point-to-multipoint connection

d) multipoint to point connection

View Answer

Answer: c

Explanation: In Bluetooth, each slave node communicates with the master of the
piconet independently i.e. each master-slave connection is independent. The slave is
not allowed to communicate with other slaves directly.

10. A scatternet can have maximum __________


a) 10 piconets

b) 20 piconets

c) 30 piconets

d) 40 piconets

View Answer

Answer: a

Explanation: A scatternet can have maximum of 10 piconets and minimum of 2


piconets. To connect these piconets, a slave node of one piconet may act as a master
in a piconet that is part of the scatternet.

.2. Which scheme/ strategy is suitable to establish the communication


between the access point (AP) and the infrastructure of LANs?

a. Wired

b. Wireless

c. Both a & b

d. Cannot Predict

View Answer / Hide Answer

ANSWER: a. Wired
3. What conclusion can be drawn if the collision is detected in CSMA/CD
algorithm while controlling the access in wireless LANs?

a. Non-reception of frame & necessity of retransmission


b. No necessity of working in duplex mode for the host
c. No necessity to prevent the signal fading
d. All of the above

View Answer / Hide Answer

ANSWER: a. Non-reception of frame & necessity of retransmission

4. Which among the following represents the building blocks of wireless


LANs?

a. BSS
b. ESS
c. Both a & b
d. None of the above

View Answer / Hide Answer

ANSWER: a. BSS

5. Which method of multiple secondary communication in TDMA is


acquired/adopted by bluetooth especially where data integrity becomes more
crucial than avoiding latency?

a. Synchronous Connection-Oriented (SCO) Link


b. Asynchronous Connectionless Link (ACL)
c. Both a & b
d. None of the above

View Answer / Hide Answer


ANSWER: b. Asynchronous Connectionless Link (ACL)

29. Bluetooth is a _______ technology that connects devices (called gadgets) in a small
area. A) wired LAN B) wireless LAN C) VLAN D) none of the above

30. A Bluetooth network is called a ________. A) piconet B) scatternet C) bluenet D)


none of the above

31. In Bluetooth, multiple ________ form a network called a _________. A) scatternet;


piconets B) piconets: scatternet C) piconets: bluenet D) bluenet; scatternet

32. A Bluetooth network consists of _____ primary device(s) and up to ____ secondary
devices. A) one; five B) five; three C) two; six D) one; seven

33. The RTS and CTS frames in CSMA/CA ____ solve the hidden station problem. The
RTS and CTS frames in CSMA/CA ____ solve the exposed station problem.

A) can; cannot B) cannot; can C) can; can D) cannot; cannot

34. In Bluetooth, the current data rate is ___1_Mbps A) 2 B) 5 C) 11 D) none of the


above

35. In Bluetooth, the _______ layer is roughly equivalent to the physical layer of the
Internet model. A) radio B) baseband C) L2CAP D) none of the above

36. In Bluetooth, the _____layer is roughly equivalent to the MAC sublayer in LANs.

A) radio B) baseband C) L2CAP D) none of the above

37. In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer in
LANs. A) radio B) baseband C) L2CAP D) none of the above

38. The access method in Bluetooth is ________. A) FDMA B) TDD-TDMA C) CDMA D)


none of the above

39. In Bluetooth, the _____ link is used when avoiding latency (delay in data delivery) is
more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL

40. In Bluetooth, the _____ link is used when data integrity is more important than
avoiding latency. A) SCO B) ACL C) ACO D) SCL
41. Bluetooth uses ______method in the physical layer to avoid interference from other
devices or other networks. A) DSSS B) FHSS C) FDMA D) none of the above

Q1. Bluetooth profiles are also referred to as: a. Interfaces b. Protocols c. Applications
d. Procedures

2. Power consumption level changes when a Bluetooth device is in different states.


Which of the following options represents the incremental trend of power consumption
among all possible states? (a) Standby Park Sniff Hold Active (b) Standby Sniff
Park Hold Active (c) Standby Park Hold Sniff Active (d) Standby Hold Park Sniff
Active

3. Which of the following protocols is NOT part of Bluetooth core protocol? a. Baseband
b. SDP c. L2CAP d. LMP e. RFCOM

4. Bluetooth security Mode 2 is: a. Link lever security b. No security c. Baseband level
security d. Service level security e. None of the above

5. The IEEE 802.11b standard is also known as: a. Bluetooth b. Hiperlan c. Wi-Fi d.
IrDA e. HomeRF

6. Which of the followings are the characteristics of WPAN? a. Short range b. Low power
c. Low cost d. Small networks e. All of the above

7. HCI is one of the Bluetooth transport protocols (a) False (b) true (c) same (d) none of
these

8. Bluetooth devices use maximum of 79 RF channels throughout the world (a) False (b)
true (c) same (d) none of these

9. Bluetooth ACL link is a best-effort link (a) True (b) false (c) same (d) none of these

Вам также может понравиться