Академический Документы
Профессиональный Документы
Культура Документы
This set of Computer Networks Multiple Choice Questions & Answers (MCQs)
focuses on “Wireless LAN”.
c) both device that allows wireless devices to connect to a wired network and
wireless devices itself
View Answer
Answer: a
Explanation: Access point in a wireless network is any device that will allow the
wireless devices to a wired network. A router is the best example of an Access
Point.
View Answer
Answer: a
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
View Answer
Answer: b
View Answer
Answer: a
a) infrastructure mode
b) ad-hoc mode
View Answer
Answer: c
b) all stations
View Answer
Answer: a
Explanation: The extended service set is a part of the IEEE 802.11 WLAN
architecture and is used to expand the range of the basic service set by allowing
connection of multiple basic service sets.
View Answer
Answer: b
Explanation: In orthogonal frequency division multiplexing, digital data is encoded
on multiple carrier frequencies. It is also used in digital television and audio
broadcasting in addition to Wireless LANs.
a) collision detection
View Answer
Answer: a
View Answer
Answer: b
View Answer
Answer: a
a. Wired
b. Wireless
c. Both a & b
d. Cannot Predict
ANSWER: a. Wired
What conclusion can be drawn if the collision is detected in CSMA/CD algorithm
while controlling the access in wireless LANs?
This set of Wireless & Mobile Communications Multiple Choice Questions & Answers
(MCQs) focuses on “Wireless Local Area Networks (WLANs)”.
View Answer
Answer: b
Explanation: WLAN stands for Wireless Local Area Network. Wireless networks is
increasingly used as a replacement for wires within homes, buildings, and office
settings through the deployment of wireless local area networks (WLANs).
2. WLANs use high power levels and generally require a license for spectrum use. (True
or False)
a) True
b) False
View Answer
Answer: b
Explanation: WLANs use low power and generally do not require a license for
spectrum. They provide ad hoc high data transmission rate connections deployed by
individuals. In the late 1980s, FCC provided licence free bands for low power spread
spectrum devices in ISM band, which is used by WLAN.
3. What is the name of 300 MHz of unlicensed spectrum allocated by FCC in ISM band?
a) UNII
b) Unlicensed PCS
c) Millimetre wave
d) Bluetooth
View Answer
Answer: a
Explanation: FCC allocated 300 MHz of unlicensed spectrum in the ISM bands. This
allocation is called the Unlicensed National Information Infrastructure (UNII) band. It
was allocated for the express purpose of supporting low power license free spread
spectrum data communication.
4. Which of the following specifies a set of media access control (MAC) and physical
layer specifications for implementing WLANs?
a) IEEE 802.16
b) IEEE 802.3
c) IEEE 802.11
d) IEEE 802.15
View Answer
Answer: c
Explanation: IEEE 802.11 is a set of media access control and physical layer
specification for implementing WLAN computer communication. It was founded in
1987 to begin standardization of spread spectrum WLANs for use in the ISM bands.
a) HIPER-LAN
b) HIPERLAN/2
c) IEEE 802.11b
d) AMPS
View Answer
Answer: d
b) IEEE 802.15.4
c) IEEE 802.11g
d) IEEE 802.11b
View Answer
Answer: d
Explanation: IEEE 802.11b was a high rate standard approved in 1999. It provided
new data rate capabilities of 11 Mbps, 5.5 Mbps in addition to the original 2 Mbps and
1 Mbps user rates of IEEE 802.11.
7. Which of the following spread spectrum techniques were used in the original IEEE
802.11 standard?
d) Hybrid technique
View Answer
Answer: a
Explanation: Original IEEE 802.11 used both the approaches of FHSS (Frequency
Hopping Spread Spectrum) and DSSS (Direct Sequence Spread Spectrum). But from
late 2001s, only DSSS modems are used within IEEE 802.11.
8. Which of the following WLAN standard has been named Wi-Fi?
a) IEEE 802.6
b) IEEE 802.15.4
d) IEEE 802.11g
View Answer
Answer: c
Explanation: The DSSS IEEE 802.11b standard has been named Wi-Fi by the
Wireless Ethernet Compatibility Alliance. It is a group that promotes adoption of
802.11 DSSS WLAN.
a) IEEE 802.11a
b) IEEE 802.11b
c) IEEE 802.15.4
d) IEEE 802.11g
View Answer
Answer: d
a) 10 Mbps
b) 54 Mbps
c) 200 Mbps
d) 1 Mbps
View Answer
Answer: a
Explanation: HomeRF 2.0 has data rate of the order of 10 Mbps. The FHSS
proponents of IEEE 802.11 have formed the HomeRF standard that supports the
frequency hopping equipment. In 2001, HomeRF developed a 10 Mbps FHSS
standard called HomeRF 2.0.
View Answer
Answer: b
Explanation: HIPER-LAN stands for High Performance Radio Local Area Network. It
was developed in Europe in mid 1990s. It was intended to provide individual wireless
LANs for computer communication.
12. What is the range of asynchronous user data rates provided by HIPER-LAN?
a) 1-100 Mbps
b) 50-100 Mbps
c) 1-20 Mbps
View Answer
Answer: c
13. What is the name of the European WLAN standard that provides user data rate upto
54 Mbps?’
a) UNII
b) WISP
c) MMAC
d) HIPERLAN/2
View Answer
Answer: d
View Answer
Answer: b
Explanation: WISP is wireless Internet Service Provider used to explore public LANs
(publan). It builds a nationwide infrastructure of WLAN access points in selected
hotels, restaurants or airports. It then charges a monthly subscription fee to users who
wish to have always on Internet access in those selected locations.
15. The price of WLAN hardware is more than 3G telephones and fixed wireless
equipment.(True or False)
a) True
b) False
View Answer
Answer: b
Explanation: As, WLAN could be used to provide access for the last 100 meters into
homes and businesses. Therefore, the price of WLAN hardware is far below 3G
telephones and fixed wireless equipment.
4. Which among the following represents the building blocks of wireless LANs?
a. BSS
b. ESS
c. Both a & b
ANSWER: a. BSS
This set of Wireless & Mobile Communications Multiple Choice Questions & Answers
(MCQs) focuses on “Introduction to Multiple Access”.
1. Multiple access schemes are used to allow ____ mobile users to share
simultaneously a finite amount of radio spectrum.
a) Many
b) One
c) Two
d) Ten-Fifteen
View Answer
Answer: a
Explanation: Multiple access schemes are used to allow many mobile users to share
simultaneously a finite amount of radio spectrum. The sharing of spectrum is required
to achieve high capacity by simultaneously allocating the available bandwidth to
multiple users.
2. The technique that makes possible the task of listening and talking in communication
system is called ________
a) Simplexing
b) Duplexing
c) Modulating
View Answer
Answer: b
3. Frequency division duplexing provides ____ distinct bands of frequencies for _____
user.
a) Two, two
b) One, two
c) Two, one
d) Two, many
View Answer
Answer: c
4. The forward band in FDD provides traffic from the mobile to base station.
a) True
b) False
View Answer
Answer: b
Explanation: The forward band in FDD provides traffic from the base station to the
mobile. The reverse band provides traffic from the mobile to the base station.
5. The frequency separation between each forward and reverse channel changes
throughout the system.
a) True
b) False
View Answer
Answer: b
6. Time division duplexing uses ____ to provide both a forward and reverse link.
a) Frequency
b) Time
d) Cell spacing
View Answer
Answer: b
Explanation: Time division duplexing (TDD) uses time instead of frequency to provide
both a forward and reverse link. In TDD, multiple users share a single radio channel
by taking turns in the time domain.
View Answer
Answer: a
Explanation: TDD is effective for fixed wireless access when all users are stationary.
This makes the propagation delay does not vary in time among the users. Because of
rigid timing required for time slotting, TDD generally is limited to cordless phone or
short range potable access.
a) Equal to
b) Not related to
c) Larger than
d) Smaller than
View Answer
Answer: c
b) False
View Answer
Answer: b
10. Narrowband FDMA allows users to share the same radio channel allocating a unique
time slot to each user.
a) True
b) False
View Answer
Answer: b
This set of Wireless & Mobile Communications Multiple Choice Questions & Answers
(MCQs) focuses on “Frequency Division Multiple Access (FDMA)”.
a) Individual, individual
b) Many, individual
c) Individual, many
d) Many, many
View Answer
Answer: a
2. During the period of call, other users can share the same channel in FDMA. State
whether True or False.
a) True
b) False
View Answer
Answer: b
Explanation: In FDMA systems, no other user can share the same channel during the
period of call. In FDD systems, the users are assigned a channel as a pair of
frequencies; one is used for the forward channel while the other frequency is used for
the reverse channel.
a) Ten
b) Two
c) One
d) Several
View Answer
Answer: c
Explanation: The FDMA channel carries one phone circuit at a time. Each individual
band or channel is wide enough to accommodate the signal spectra of the
transmissions to be propagated.
4. If the FDMA channel is not in use, it can be used by other users. State whether True
or False.
a) True
b) False
View Answer
Answer: b
Explanation: If an FDMA channel is not in use, the it sits idle and cannot be used by
other users to increase or share capacity. It is essentially a wasted resource.
a) Wide
b) Narrow
c) Large
d) Zero
View Answer
Answer: b
a) Large, high
b) Small, low
c) Small, high
d) Large, low
View Answer
Answer: d
7. Due to _________ transmission scheme, ______ bits are needed for overhead in
FDMA systems.
a) Continuous, few
b) Discontinuous, few
c) Continuous, many
d) Discontinuous, many
View Answer
Answer: a
Explanation: Since FDMA is a continuous transmission scheme, fewer bits are needed
for overhead purposes (such as synchronization and framing bits) as compared to
TDMA.
8. Which of the following is not true for FDMA systems as compared to TDMA systems?
a) Low complexity
c) Tight RF filtering
d) Narrow bandwidth
View Answer
Answer: b
Explanation: FDMA systems have higher cell site system costs as compared to TDMA
systems. It is due to single channel per carrier design, and the need to use costly
bandpass filters to eliminate spurious radiation at the base station.
9. __________ is undesired RF radiation.
a) Intermodulation frequency
b) Intermediate frequency
c) Instantaneous frequency
d) Instrumental frequency
View Answer
Answer: a
a) GSM
b) W-CDMA
c) Cordless telephone
d) AMPS
View Answer
Answer: d
Explanation: The first US analog cellular system, the Advanced Mobile Phone System
(AMPS) is based on FDMA/FDD. A single user occupies a single channel while the
call is in progress.
11. In US AMPS, 416 channels are allocated to various operators with 10 kHz guard
band and channel between them is 30 kHz. What is the spectrum allocation given to
each operator?
a) 12.5 kHz
b) 30 kHz
c) 12.5 MHz
d) 30 MHz
View Answer
Answer: c
This set of Wireless & Mobile Communications Multiple Choice Questions & Answers
(MCQs) focuses on “Time Division Multiple Access (TDMA)”.
a) True
b) False
View Answer
Answer: b
Explanation: TDMA systems transmit data in a buffer and burst method. Thus, the
transmission for any user is not continuous.
2. Preamble contains _____
a) Address
b) Data
c) Guard bits
d) Trail bits
View Answer
Answer: a
3. _____ are utilized to allow synchronization of the receivers between different slots and
frames.
a) Preamble
b) Data
c) Guard bits
d) Trail bits
View Answer
Answer: c
Explanation: Guard times are utilized to allow synchronization of the receivers
between different slots and frames. TDMA/FDD systems intentionally induce several
time slots of delay between the forward and reverse time slots for a particular user.
c) No requirement of duplexers
View Answer
Answer: a
Explanation: TDMA share a single carrier frequency with several users, where each
user makes use of non-overlapping time slots. The number of time slots per frame
depends on several factors, such as modulation technique, available bandwidth etc.
a) Continuous, complex
b) Continuous, simple
c) Discontinuous, complex
d) Discontinuous, simple
View Answer
Answer: d
Explanation: Because of discontinuous transmissions in TDMA, the handoff process is
much simpler for a subscriber unit, since it is able to listen for other base stations
during idle time slots.
a) High, burst
b) High, continuous
c) Low, burst
d) No, burst
View Answer
Answer: a
a) True
b) False
View Answer
Answer: b
Explanation: TDMA has an advantage that it can allocate different numbers of time
slots per frame to different users. Thus, bandwidth can be supplied on demand to
different users by concatenating or reassigning time slots based on priority.
a) Efficiency
b) Figure of merit
d) Mean
View Answer
Answer: a
9. A TDMA system uses 25 MHz for the forward link, which is broken into radio channels
of 200 kHz. If 8 speech channels are supported on a single radio channel, how many
simultaneous users can be accommodated?
a) 25
b) 200
c) 1600
d) 1000
View Answer
Answer: d
Explanation: For a TDMA system that uses 25 MHz for the forward link, which is
broken into radio channels of 200 kHz. If 8 speech channels are supported on a single
radio channel, 1000 simultaneous users can be accommodated as N=(25 MHz)/(200
kHz/8).
10. What is the time duration of a bit if data is transmitted at 270.833 kbps in the
channel?
a) 270.833 s
b) 3 μs
c) 3.692 μs
d) 3.692 s
View Answer
Answer: c
Explanation: If data is transmitted at 270.833 kbps in the channel, the time duration of
a bit will be 3.692 μs, as Tb=(1/270.833 kbps)= 3.692 μs.
1. SSMA uses signals which have a transmission bandwidth that is smaller than the
minimum required RF bandwidth.
a) True
b) False
View Answer
Answer: b
Explanation: Spread spectrum multiple access (SSMA) uses signals which have a
transmission bandwidth that is several orders of magnitude greater than the minimum
required RF bandwidth.
a) Narrowband, wideband
b) Wideband, narrowband
c) Unmodulated, modulated
View Answer
Answer: a
11. _______ arises from the fact that the spreading sequences of different users are not
orthogonal.
a) Near-far problem
b) Line of sight
c) Windowing
d) Self jamming
View Answer
Answer: d
1. IEEE has defined the specifications for a wireless LAN, called _______, which
covers the physical and data link layers.
5. In IEEE 802.11, communication between two stations in two different BSSs usually
occurs via two ________. A) BSSs B) ESSs C) APs D) none of the above
6. In IEEE 802.11, a station with ________ mobility is either stationary (not moving) or
moving only inside a BSS. A) no-transition B) BSS-transition C) ESS-transition D) none
of the above
7. In IEEE 802.11, a station with ________mobility can move from one BSS to another,
but the movement is confined inside one ESS. A) no-transition B) BSS-transition C)
ESS-transition D) none of the above
8. In IEEE 802.11, a station with ________ mobility can move from one ESS to another.
A) no-transition B) BSS-transition C) ESS-transition D) none of the above
10. In IEEE 802.11, when a frame is going from one station in a BSS to another without
passing through the distribution system, the address flag is _____ A) 00 B) 01 C) 10 D)
11
11. In IEEE 802.11, when a frame is coming from an AP and going to a station, the
address flag is _______. A) 00 B) 01 C) 10 D) 11
12. In IEEE 802.11, when a frame is going from a station to an AP, the address flag is
_____. A) 00 B) 01 C) 10 D) 11
13. In IEEE 802.11, when a frame is going from one AP to another AP in a wireless
distribution system, the address flag is _____ A) 00 B) 01 C) 10 D) 11
14. The IEEE 802.11 standard for wireless LANs defines two services: ______ and
_______. A) BSS; ASS B) ESS; SSS C) BSS; ESS D) BSS; DCF
15. In IEEE 802.11, the access method used in the DCF sublayer is _________. A)
ALOHA B) CSMA/CA C) CSMA/CD D) none of the above
16. In IEEE 802.11, the access method used in the PCF sublayer is ______. A)
contention B) controlled C) polling D) none of the above
17. In IEEE 802.11, the ______ is a timer used for collision avoidance. A) NAV B) BSS
C) ESS D) none of the above
18. In IEEE 802.11, the MAC layer frame has ______ fields. A) four B) five C) six D)
none of the above
19. In IEEE 802.11, the addressing mechanism can include up to ______addresses. A)
four B) five C) six D) none of the above
20. The original IEEE 802.11, uses _________. A) FHSS B) DSSS C) OFDM D) either
(a) or (b)
21. The IEEE 802.11a, uses _________. A) FHSS B) DSSS C) OFDM D) either (a) or
(b)
22. The IEEE 802.11b, uses _________. A) FHSS B) DSSS C) OFDM D) either (a) or
(b)
23. The IEEE 802.11g, uses _________. A) FHSS B) DSSS C) OFDM D) either (a) or
(b)
25. IEEE 802.11a, has a data rate of _____Mbps. A) 1 B) 2 C) 6 D) none of the above
26. IEEE 802.11b, has a data rate of _____Mbps. A) 1 B) 2 C) 5.5 D) none of the above
27. IEEE 802.11g, has a data rate of _____Mbps. A) 1 B) 2 C) 11 D) 22
28. The IEEE 802.11 wireless LANs use ________ types of frames. A) four B) five C) six
D) none of the above
1. What is the frequency range of the IEEE 802.11a standard? A.2.4Gbps B.5Gbps
C.2.4GHz D.5GHz
2. What is the maximum distance running the lowest data rate for 802.11b?
A. About 100 feet B. About 175 feet C. About 300 feet D. About 350 feet
3. What is the maximum distance with maximum data rate for 802.11a? A. About 65-75
feet B. About 90-100 feet C. About 150 feet D. Over 200 feet
4. What is the frequency range of the IEEE 802.11b standard? A.2.4Gbps B.5Gbps
C.2.4GHz D.5GHz
Which of the following is ________________algorithm to secure IEEE 802.11
wireless networks?
Options
- Wiredless Equivalent Privacy (WEP)
- Wired Equivalent Privacy (WEP)
- Wired Extended Privacy (WEP)
- none of these
a) Wireless access
b) Wireless security
c) Wired Security
View Answer
Answer: b
a) WEP
b) WPA
c) WPA2
d) WPA3
View Answer
Answer: d
Explanation: The most extensive types of wireless securities are Wired Equivalent
Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and WPA3. WPA3 is the
strongest and recently released.
3. Which among the following is the least strong security encryption standard?
a) WEP
b) WPA
c) WPA2
d) WPA3
View Answer
Answer: a
a) WPA2
b) WPA3
c) WEP
d) WPA
View Answer
Answer: c
Explanation: The most widespread types of wireless securities are Wired Equivalent
Privacy (WEP), Wi-Fi Protected Access (WPA), WPA2 and WPA3. WEP is an old
IEEE 802.11 standard from the year 1999.
a) WPA
b) Access Point
c) WAP
d) Access Port
View Answer
Answer: b
Explanation: The central node of 802.11 wireless operations is the Access Point (AP).
It is that interface which acts as an intermediary of a wired & wireless network; and all
the associated wireless clients’ use this to exchange data with it.
6. AP is abbreviated as _____________
a) Access Point
b) Access Port
c) Access Position
d) Accessing Port
View Answer
Answer: a
7. ___________________ is alike as that of Access Point (AP) from 802.11, & the
mobile operators uses it for offering signal coverage.
d) Transceiver Station
View Answer
Answer: c
Explanation: Base Transceiver Station (BTS) which is also known as a base station
(BS) or radio base station (RBS) is alike as that of Access Point (AP) from 802.11, &
the mobile operators use it for offering signal coverage.
View Answer
Answer: d
a) 2
b) 3
c) 4
d) 5
View Answer
Answer: a
10. When a wireless user authenticates to any AP, both of them go in the course of four-
step authentication progression which is called _____________
a) AP-handshaking
b) 4-way handshake
c) 4-way connection
d) wireless handshaking
View Answer
Answer: b
Explanation: When a wireless user authenticates to any AP, both of them go in the
course of four-step authentication progression which is called 4-way handshake.
View Answer
Answer: b
Explanation: WPS stands for WiFi Protected Setup began to show up a few years
back on wireless access points as a new way of adding or connecting new devices to
the network by just pushing a key (within the router) & inserting the password.
12. It is recommended to use WPA2 or WPA3 encryption standard as they are strong
and more secure.
a) True
b) False
View Answer
Answer: a
13. ___________ is a process of wireless traffic analysis that may be helpful for forensic
investigations or during troubleshooting any wireless issue.
View Answer
Answer: a
a) Maltego
b) BurpSuit
c) Nessus
d) Wireshark
View Answer
Answer: d
Explanation: The process of analyzing wireless traffic that may be helpful for forensic
investigations or during troubleshooting any wireless issue is called Wireless Traffic
Sniffing. Popular tools used in this case are Wireshark and Kismet.
15. ___________________ began to show up few years back on wireless access points
as a new way of adding or connecting new devices.
a) WPA2
b) WPA
c) WPS
d) WEP
View Answer
Answer: c
Explanation: WiFi Protected Setup (WPS) began to show up a few years back on
wireless access points as a new way of adding or connecting new devices to the
network by just pushing a key (within the router) & typing an eight-digit password on
the client device.
This set of Wireless & Mobile Communications Questions and Answers for Freshers
focuses on “Bluetooth and Personal Area Networks (PANs)”.
a) Bluetooth
b) WWW
c) HTML
d) VPN
View Answer
Answer: d
a) 1 Km
b) 10 m
c) 1 m
d) 10 Km
View Answer
Answer: b
Explanation: The power of the transmitter governs the range over which a Bluetooth
device can operate. Generally, Bluetooth devices are said to fall into one of three
classes. The most common kind is class 2, and it operates in 10 m range.
3. Bluetooth standard is named after ______
View Answer
Answer: c
Explanation: Bluetooth standard is named after King Harald Bluetooth. He was the
10th century Viking who united Denmark and Norway. The Bluetooth standard aims to
unify the connectivity chores of appliances within the personal workspace of an
individual.
a) Ka Band
b) L Band
c) Ku Band
View Answer
Answer: d
View Answer
Answer: a
a) 120 milliseconds
b) 625 microseconds
c) 577 microseconds
d) 5.7 seconds
View Answer
Answer: b
a) DQPSK
b) MSK
c) GFSK
d) BPSK
View Answer
Answer: c
Explanation: Bluetooth uses GFSK (Gaussian Frequency Shift Keying). When GFSK
is used for Bluetooth modulation, the frequency of the carrier is shifted to carry the
modulation. By doing this the Bluetooth modulation achieves a bandwidth of 1 MHz
with stringent filter requirements to prevent interference on other channels.
a) 270.833 Kbps
b) 1 Gbps
c) 100 Mbps
d) 1 Mbps
View Answer
Answer: d
Explanation: Each user in Bluetooth uses a radio channel symbol rate of 1 Mbps using
GFSK modulation. The frequency hopping scheme of each Bluetooth user is
determined from a cyclic code with a length of 1027-1.
a) 10-3
b) 10-10
c) 103
d) 10-1
View Answer
Answer: a
Explanation: Bluetooth has a bit error rate (BER) of 10-3. Bluetooth uses a number of
forward error control (FEC) coding and automatic repeat request (ARR) schemes to
achieve this bit rate.
10. Which of the following standard committee specifies Bluetooth and other Personal
Area Networks (PAN)?
a) IEEE 802.11b
b) IEEE 802.15
c) IEEE 802.11g
d) IEEE 802.16
View Answer
Answer: b
This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses
on “Bluetooth”.
a) scatternet
b) micronet
c) mininet
d) multinet
View Answer
Answer: a
Explanation: Piconet is the basic unit of a bluetooth system having a master node and
upto seven active slave nodes. A collection of piconets is called scatternet and a slave
node of a piconet may act as a master in a piconet that is part of the scatternet.
a) 63
b) 127
c) 255
d) 511
View Answer
Answer: c
Explanation: A slave node in a piconet can be instructed by the master node to go into
parked mode. Then the slave node enters the parked mode in which the node is not
disconnected from the network but is inactive unless the master wakes it up.
View Answer
Answer: b
View Answer
Answer: a
b) bluesnarfing
c) bluestring
d) bluescoping
View Answer
Answer: b
View Answer
Answer: a
View Answer
Answer: b
View Answer
Answer: a
Explanation: Bluetooth operates on 2.45 GHz frequency ISM band for transmission. It
is used to create a wireless personal area network for data transfer up to a distance of
10 meters.
a) point-to-point connections
b) point-to-multipoint connection
View Answer
Answer: c
Explanation: In Bluetooth, each slave node communicates with the master of the
piconet independently i.e. each master-slave connection is independent. The slave is
not allowed to communicate with other slaves directly.
b) 20 piconets
c) 30 piconets
d) 40 piconets
View Answer
Answer: a
a. Wired
b. Wireless
c. Both a & b
d. Cannot Predict
ANSWER: a. Wired
3. What conclusion can be drawn if the collision is detected in CSMA/CD
algorithm while controlling the access in wireless LANs?
a. BSS
b. ESS
c. Both a & b
d. None of the above
ANSWER: a. BSS
29. Bluetooth is a _______ technology that connects devices (called gadgets) in a small
area. A) wired LAN B) wireless LAN C) VLAN D) none of the above
32. A Bluetooth network consists of _____ primary device(s) and up to ____ secondary
devices. A) one; five B) five; three C) two; six D) one; seven
33. The RTS and CTS frames in CSMA/CA ____ solve the hidden station problem. The
RTS and CTS frames in CSMA/CA ____ solve the exposed station problem.
35. In Bluetooth, the _______ layer is roughly equivalent to the physical layer of the
Internet model. A) radio B) baseband C) L2CAP D) none of the above
36. In Bluetooth, the _____layer is roughly equivalent to the MAC sublayer in LANs.
37. In Bluetooth, the L2CAP sublayer, is roughly equivalent to the LLC sublayer in
LANs. A) radio B) baseband C) L2CAP D) none of the above
39. In Bluetooth, the _____ link is used when avoiding latency (delay in data delivery) is
more important than integrity (error-free delivery). A) SCO B) ACL C) ACO D) SCL
40. In Bluetooth, the _____ link is used when data integrity is more important than
avoiding latency. A) SCO B) ACL C) ACO D) SCL
41. Bluetooth uses ______method in the physical layer to avoid interference from other
devices or other networks. A) DSSS B) FHSS C) FDMA D) none of the above
Q1. Bluetooth profiles are also referred to as: a. Interfaces b. Protocols c. Applications
d. Procedures
3. Which of the following protocols is NOT part of Bluetooth core protocol? a. Baseband
b. SDP c. L2CAP d. LMP e. RFCOM
4. Bluetooth security Mode 2 is: a. Link lever security b. No security c. Baseband level
security d. Service level security e. None of the above
5. The IEEE 802.11b standard is also known as: a. Bluetooth b. Hiperlan c. Wi-Fi d.
IrDA e. HomeRF
6. Which of the followings are the characteristics of WPAN? a. Short range b. Low power
c. Low cost d. Small networks e. All of the above
7. HCI is one of the Bluetooth transport protocols (a) False (b) true (c) same (d) none of
these
8. Bluetooth devices use maximum of 79 RF channels throughout the world (a) False (b)
true (c) same (d) none of these
9. Bluetooth ACL link is a best-effort link (a) True (b) false (c) same (d) none of these