
MWT .
Authored by Kay Lee
Other
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Among the following WLAN configuration, which one of the configurations uses no access points?
Extended Service Set
Independent basic service set
Lightweight Access Point
Basic Service Set
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a wireless network, the digital signals are converted and transmitted from source to destination in the form of
Digital frequency
Radio wave frequency
Sea wave frequency
Air wave frequency
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which of the following standard is recommended?
5 GHz provides Increased network capacity with up to 23 non-overlapping channels
5 GHz channel selection requires an autonomous access point
Adjacent cell with overlapping channel uses a repeater access point
Cells that overlap one another are configured to use non-overlapping
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker created a fake access point and targeted a victim machine to access data such as credit card information. Such type of attack is called
Man in the Middle attack
Malicious Association
Network Injection
Identity theft
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker uses an RF jammer and disturbs your communication. His intention is to perform?
Eavesdropping
Denial of service
Physical theft
Phishing attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A team leader wants to share a file with his team in the conference room where the signal strength is very poor. So, he decided to share it with Bluetooth. What type of network configuration mode it is treated as?
Mesh Network
Adhoc Network
Infrastructure Network
Star Network
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A wireless LAN will be deployed in a private hospital located in Kuching, Sarawak. Which criteria would be addressed when discussing a potential RF jamming attack?
Data Security
Physical Security
Wiring Closet Security
Access Point Security
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
คำถาม Tourism Quiz ช่วงที่ 1
Quiz
•
University
21 questions
Introduction to Chinese Culture
Quiz
•
University
20 questions
Creating Lesson Plans EDUC2024
Quiz
•
University
20 questions
Sports
Quiz
•
1st Grade - University
20 questions
Introduction to Global Business
Quiz
•
12th Grade - University
20 questions
PLANTS AND THEIR ENVIRONMENT
Quiz
•
University
20 questions
Movies & Anime
Quiz
•
University
20 questions
Quiz No. 4 & 5 - One-Way ANOVA and Two-Way ANOVA
Quiz
•
University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Other
7 questions
How James Brown Invented Funk
Interactive video
•
10th Grade - University
5 questions
Helping Build the Internet: Valerie Thomas | Great Minds
Interactive video
•
11th Grade - University
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
19 questions
Review2-TEACHER
Quiz
•
University
15 questions
Pre2_STUDENT
Quiz
•
University
20 questions
Ch. 7 Quadrilateral Quiz Review
Quiz
•
KG - University