Wireless Communication Technologies Quiz

Wireless Communication Technologies Quiz

10th Grade

21 Qs

quiz-placeholder

Similar activities

11.5.15 - TestOut PcPro v7.0: Bluetooth, RFID and NFC

11.5.15 - TestOut PcPro v7.0: Bluetooth, RFID and NFC

10th Grade

20 Qs

Network Hardware

Network Hardware

10th Grade

16 Qs

Post Test Jaringan Dasar Komputer

Post Test Jaringan Dasar Komputer

10th Grade

20 Qs

Chapter 9 Netacad

Chapter 9 Netacad

6th - 12th Grade

20 Qs

Parts Of a Computer

Parts Of a Computer

9th - 12th Grade

18 Qs

Computer Network

Computer Network

9th - 12th Grade

20 Qs

IT Fundamentals Networking

IT Fundamentals Networking

9th - 12th Grade

17 Qs

Telecommunication and Computer Networking

Telecommunication and Computer Networking

10th - 11th Grade

20 Qs

Wireless Communication Technologies Quiz

Wireless Communication Technologies Quiz

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Edgar Flores

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection. Which technology should Sherry suggest?

NFC technology can be used to connect mobile devices to speakers

WLANs can be used to connect mobile devices to speakers

RFID technology can be used to connect laptop mouse without any wired connection

Bluetooth technology can be used to connect devices without any wired connection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate an IoT device?

Narrowband IoT

Subscriber identity module

Zigbee

Cellular IoT baseband

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of RFID attack can unauthorized users listen to communications between RFID tags and readers?

Eavesdropping

Data theft

Unauthorized tag access

Fake tags

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?

Evil twin

Wireless denial of service attacks

Rogue access point

Jamming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?

Bluesnarfing

NFC attack

Bluejacking

RFID attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which wireless probe can be designed by configuring a laptop computer to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?

Dedicated probes

Wireless device probe

Access point probe

Desktop probe

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are jamming attacks generally rare?

The transmitter is not very powerful and must be close to the target

They can't get around new IEEE amendments that fully protect WLANs

They require expensive, sophisticated equipment

They can't identify WLAN RF signals from other device signals

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?