Professional Documents
Culture Documents
Answer: a Answer: c
Explanation: WiMAX physical layer uses Explanation: Both advanced encryption
orthogonal frequency division multiplexing as it standard and triple data encryption standard
provides simplified reception in multipath and are block cipher techniques and are popularly
allows WiMAX to operate in NLOS conditions. used in WiMAX and other applications for
secure encryption.
Answer: a Answer: a
Explanation: Subscriber stations in WiMAX are Explanation: Piconet is the basic unit of a
transceivers (transmitter and bluetooth system having a master node and
receivers). They are used to convert radio upto seven active slave nodes. A collection of
signals into digital signals that can be routed to piconets is called scatternet and a slave node of
and from communication devices. There is a a piconet may act as a master in a piconet that
variety of types of WiMAX subscriber stations is part of the scatternet.
like portable PCMCIA cards and fixed stations
that provide service to multiple users.
Answer: b Answer: a
Explanation: Unauthorised access of information Explanation: Bluetooth operates on 2.45 GHz
from a wireless device through a bluetooth frequency ISM band for transmission. It is used to
connection is called create a wireless personal area network for data
Bluesnarfing. It is done through exploiting the transfer up to a distance of 10 meters.
vulnerabilities of the Bluetooth device to steal
Subject : computer network security SEM: I
MCQs on Unit II : Wireless Network wireless devices to a wired network. A router
is the best example of an Access Point.
19. Bluetooth supports _______
a) point-to-point connections
b) point-to-multipoint connection 22. In wireless ad-hoc network _________ a)
c) both point-to-point connections and point access point is not required
to-multipoint connection b) access point is must
d) multipoint to point connection c) nodes are not required
d) all nodes are access points
Answer: c
Explanation: In Bluetooth, each slave node Answer: a
communicates with the master of the piconet Explanation: An ad-hoc wireless network is a
independently i.e. each master slave connection decentralized kind of a wireless network. An
is independent. The slave is not allowed to access point is usually a central device and it
communicate with other slaves directly. would go against the rules of the ad
hoc network to use one. Hence it is not
required.
Answer: a Answer: a
Explanation: Access point in a wireless Explanation: A Wireless Distribution System
network is any device that will allow the allows the connection of multiple access points
together. It is used to expand a wireless network
to a larger network.
25. A wireless network interface controller can work 28. Which one of the following event is not
in _______ possible in wireless LAN?
a) infrastructure mode a) collision detection
b) ad-hoc mode b) acknowledgement of data frames c)
c) both infrastructure mode and ad-hoc mode d) multi-mode data transmission
WDS mode d) connection to wired networks
Answer: c Answer: a
Explanation: A wireless network interface Explanation: Collision detection is not possible in
controller works on the physical layer and the wireless LAN with no extensions. Collision
data link layer of the OSI model. Infrastructure detection techniques for multiple access like
mode WNIC needs access point but in ad-hoc CSMA/CD are used to detect collisions in
mode access point is not required. Wireless LANs.
26. In wireless network an extended service set 29. What is Wired Equivalent Privacy (WEP)? a)
is a set of ________ security algorithm for ethernet
a) connected basic service sets b) security algorithm for wireless networks c)
b) all stations security algorithm for usb communication d)
c) all access points security algorithm for emails
d) connected access points
Answer: b
Answer: a Explanation: WEP is a security algorithm for
Explanation: The extended service set is a part wireless network which intended to provide data
of the IEEE 802.11 WLAN architecture and is confidentiality comparable to that of traditional
used to expand the range of the basic service wired networks. It was
set by allowing connection of multiple basic introduced in 1997.
service sets.
Answer: c
32. WLANs use high power levels and generally Explanation: IEEE 802.11 is a set of media
require a license for spectrum use. a) True access control and physical layer
b) False specification for implementing WLAN computer
communication. It was founded in 1987 to begin
Answer: b standardization of spread spectrum WLANs for
Explanation: WLANs use low power and use in the ISM bands.
generally do not require a license for spectrum.
They provide ad hoc high data transmission rate
connections deployed by individuals. In the late 35. Which of the following is not a standard of
1980s, FCC provided licence free bands for low WLAN?
power spread spectrum devices in ISM band, a) HIPER-LAN
which is used by WLAN. b) HIPERLAN/2
c) IEEE 802.11b
d) AMPS
33. What is the name of 300 MHz of unlicensed
spectrum allocated by FCC in ISM band? Answer: d
a) UNII Explanation: AMPS is a standard of first
b) Unlicensed PCS generation network. HIPERLAN is a WLAN
c) Millimetre wave standard developed in Europe in mid 1990s.
d) Bluetooth HIPERLAN/2 is also developed in Europe that
provides upto 54 Mbps of user data.
Answer: a
Explanation: FCC allocated 300 MHz of
unlicensed spectrum in the ISM bands. This 36. Which of the following is the 802.11 High Rate
allocation is called the Unlicensed National Standard?
Information Infrastructure (UNII) band. It was a) IEEE 802.15
allocated for the express purpose of supporting b) IEEE 802.15.4
low power license free spread spectrum data c) IEEE 802.11g
communication. d) IEEE 802.11b
Answer: d
Explanation: IEEE 802.11b was a high rate
standard approved in 1999. It provided new data techniques were used in the original IEEE 802.11
rate capabilities of 11 Mbps, 5.5 Mbps standard?
in addition to the original 2 Mbps and 1 a) FHSS and DSSS
Mbps user rates of IEEE 802.11.
Answer: b
Explanation: WISP is wireless Internet Service 47. What is the nominal range of Bluetooth? a) 1
Provider used to explore public LANs (publican). Km
It builds a nationwide infrastructure of WLAN b) 10 m
access points in selected hotels, restaurants or c) 1 m
airports. It then charges a monthly subscription d) 10 Km
fee to users who wish to have always on
Internet access in those selected locations. Answer: b
Explanation: The power of the transmitter
governs the range over which a Bluetooth
45. The price of WLAN hardware is more than 3G device can operate. Generally, Bluetooth
telephones and fixed wireless equipment. a) True devices are said to fall into one of three
classes. The most common kind is class 2, and
b) False
it operates in 10 m range.
Answer: b
Explanation: As, WLAN could be used to
provide access for the last 100 meters into 48. Bluetooth standard is named after
homes and businesses. Therefore, the price of ___________
WLAN hardware is far below 3G telephones and a) King Ronaldo Bluetooth
fixed wireless equipment b) Pope Vincent Bluetooth
c) King Herald Bluetooth
d) Pope Francis Bluetooth
Answer: c
Explanation: Bluetooth standard is named after 49. Bluetooth operates in which band? a)
King Harald Bluetooth. He was the 10th century Ka Band
Viking who united Denmark and Norway. The b) L Band
Bluetooth standard aims to unify the c) Ku Band
connectivity chores of appliances within the d) 2.4 GHz ISM Band
personal workspace of an individual.
B.2
56. A Bluetooth network consists of _________
C.6
primary device(s) and up to _________ secondary
devices.
C.bluenet
62. IEEE 802.11g, has a data rate of _________
D.none of the above Mbps.
58. Bluetooth is a _________ technology that A.1
connects devices (called gadgets) in a small area.
B.2
A.wired LAN
C.11
B.wireless LAN
D.22
C.VLAN
63. IEEE has defined the specifications for a
D.none of the above wireless LAN, called _________, which covers the
59. Bluetooth uses _________ method in the physical and data link layers.
physical layer to avoid interference from other A.IEEE 802.3
devices or other networks.
B.IEEE 802.5
A.DSSS
C.IEEE 802.11
B.FHSS
D.IEEE 802.2
Subject : computer network security SEM: I