
Wireless Communication Technologies Quiz
Authored by Edgar Flores
Computers
10th Grade
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection. Which technology should Sherry suggest?
NFC technology can be used to connect mobile devices to speakers
WLANs can be used to connect mobile devices to speakers
RFID technology can be used to connect laptop mouse without any wired connection
Bluetooth technology can be used to connect devices without any wired connection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate an IoT device?
Narrowband IoT
Subscriber identity module
Zigbee
Cellular IoT baseband
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which type of RFID attack can unauthorized users listen to communications between RFID tags and readers?
Eavesdropping
Data theft
Unauthorized tag access
Fake tags
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?
Evil twin
Wireless denial of service attacks
Rogue access point
Jamming
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?
Bluesnarfing
NFC attack
Bluejacking
RFID attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which wireless probe can be designed by configuring a laptop computer to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?
Dedicated probes
Wireless device probe
Access point probe
Desktop probe
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why are jamming attacks generally rare?
The transmitter is not very powerful and must be close to the target
They can't get around new IEEE amendments that fully protect WLANs
They require expensive, sophisticated equipment
They can't identify WLAN RF signals from other device signals
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
Technology Innovations
Quiz
•
5th - 12th Grade
16 questions
Python programming
Quiz
•
6th - 12th Grade
22 questions
Steve Jobs
Quiz
•
6th - 12th Grade
22 questions
1.2.4 Data Storage - OCR
Quiz
•
9th - 10th Grade
20 questions
iMovie App Quiz
Quiz
•
6th - 12th Grade
25 questions
Pengenalan Komputer
Quiz
•
10th Grade
20 questions
Google SketchUp Tool
Quiz
•
KG - University
18 questions
PC Component Identification
Quiz
•
6th - 12th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Computers
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade
14 questions
[AP CSP] JavaScript Programming Quiz
Quiz
•
9th - 12th Grade
10 questions
Understanding Computers and Computer Engineering
Interactive video
•
7th - 12th Grade
37 questions
Python - Tuples, Lists, and List Methods
Quiz
•
9th - 12th Grade