You are on page 1of 11

MCQs on Unit II : Wireless Network supported by WiMAX?

a) binary phase shift keying modulation b)


quadrature phase shift keying modulation c)
1. WiMAX stands for ___________
quadrature amplitude modulation d) all of the
a) wireless maximum communication b)
mentioned
worldwide interoperability for microwave access
c) worldwide international standard for Answer: d
microwave access Explanation: WiMAX supports a variety of
d) wireless internet maximum communication modulation schemes such as binary phase shift
keying modulation, quadrature phase shift
Answer: b keying modulation, and quadrature amplitude
Explanation: WiMAX or worldwide modulation and allows for the scheme to change
interoperability for microwave access is a set of on a burst-by-burst basis per link, depending on
wireless communication standards. It provides channel conditions.
support for multiple physical layer (PHY) and
Media Access Control (MAC) options. It is based
on IEEE 802.16 standards.

5. WiMAX MAC layer provides an interface


between ___________
a) higher transport layers and physical layer b)
2. WiMAX provides ________ application layer and network layer c) data link
a) simplex communication layer and network layer d) session layer and
b) half duplex communication application layer
c) full duplex communication
d) no communication Answer: a
Explanation: WiMAX provides support for
Answer: c multiple physical layer (PHY) on the physical
Explanation: WiMax was developed to provide layer and Media Access Control (MAC) options
wireless broadband access to buildings. It can for higher layers to provide wireless broadband
also be used to connect WLAN hotspots to the access to buildings.
Internet. It is based on IEEE 802.16 standards.

6. For encryption, WiMAX supports _______ a)


3. WiMAX uses the _________ advanced encryption standard
a) orthogonal frequency division multiplexing b) b) triple data encryption standard
time division multiplexing c) advanced encryption standard and triple data
c) space division multiplexing encryption standard
d) channel division multiplexing d) double data encryption standard

Answer: a Answer: c
Explanation: WiMAX physical layer uses Explanation: Both advanced encryption
orthogonal frequency division multiplexing as it standard and triple data encryption standard
provides simplified reception in multipath and are block cipher techniques and are popularly
allows WiMAX to operate in NLOS conditions. used in WiMAX and other applications for
secure encryption.

4. Which of the following modulation schemes is

Subject : computer network security SEM: I


MCQs on Unit II : Wireless Network network.

7. WiMAX provides _______


a) VoIP services 10. Which of the following frequencies is not used
b) IPTV services in WiMAX for communication? a) 2.3 GHz
c) Both VoIP and IPTV services b) 2.4 GHz
d) no IPTV services c) 2.5 GHz
d) 3.5 GHz
Answer: c
Explanation: IPTV can be transmitted over Answer: b
WiMAX, and relies on packet-switching to offer Explanation: The 2.4GHz ISM frequency band
reliable delivery. VoIP can be operated over a is used for personal area network technologies
WiMax network with no special hardware or such as Bluetooth and hence is not suitable for
software. WiMAX which is mostly used for Metropolitan
Area Networks.

8. Devices that provide the connectivity to a 11. An interconnected collection of piconet is


WiMAX network are known as _________ a) called ___________
subscriber stations a) scatternet
b) base stations b) micronet
c) gateway c) mininet
d) switch stations d) multinet

Answer: a Answer: a
Explanation: Subscriber stations in WiMAX are Explanation: Piconet is the basic unit of a
transceivers (transmitter and bluetooth system having a master node and
receivers). They are used to convert radio upto seven active slave nodes. A collection of
signals into digital signals that can be routed to piconets is called scatternet and a slave node of
and from communication devices. There is a a piconet may act as a master in a piconet that
variety of types of WiMAX subscriber stations is part of the scatternet.
like portable PCMCIA cards and fixed stations
that provide service to multiple users.

12. In a piconet, there can be up to ________


parked nodes in the network.
9. WiMAX is mostly used for __________ a) 63
a) local area network b) 127
b) metropolitan area network c) 255
c) personal area network d) 511
d) wide area network
Answer: c
Answer: b Explanation: A slave node in a piconet can be
Explanation: WiMAX provides Wi-Fi instructed by the master node to go into parked
connectivity within the home or business for mode. Then the slave node enters the parked
computers and smartphones. WiMAX network mode in which the node is not disconnected
operators typically provide a WiMAX from the network but is inactive unless the
Subscriber Unit to do so. The subscriber unit master wakes it up.
is used to connect to the metropolitan WiMAX
Subject : computer network security SEM: I
MCQs on Unit II : Wireless Network the transmitted information.

13. Bluetooth is the wireless technology for


__________ 16. What is A2DP (advanced audio distribution
a) local area network profile)?
b) personal area network a) a bluetooth profile for streaming audio b) a
c) metropolitan area network bluetooth profile for streaming video c) a
d) wide area network bluetooth profile for security
d) a bluetooth profile for file management
Answer: b
Explanation: Bluetooth is a wireless technology Answer: a
used to create a wireless personal area network Explanation: A2DP stands for Advanced Audio
for data transfer up to a distance of 10 meters. Distribution Profile is a transfer standard use to
It operates on 2.45 GHz frequency band for transmit high definition audio through
transmission. Bluetooth. It is mainly used in Bluetooth
speakers and wireless headphones.

14. Bluetooth uses __________


a) frequency hopping spread spectrum b) 17. In a piconet, one master device ________ a)
orthogonal frequency division multiplexing c) time can not be slave
division multiplexing b) can be slave in another piconet
d) channel division multiplexing c) can be slave in the same piconet d)
can be master in another piconet
Answer: a
Explanation: Frequency hopping spread Answer: b
spectrum is a method of transmitting radio Explanation: In a scatternet, a slave node of one
signals by rapidly changing the carrier frequency piconet may act as a master in a piconet that is
and is controlled by the codes known to the part of the scatternet. The scatternet uses this
sender and receiver only. property to connect many piconets together to
create a larger network.

15. Unauthorised access of information from a


wireless device through a bluetooth connection is 18. Bluetooth transceiver devices operate in
called _________ ______ band.
a) bluemaking a) 2.4 GHz ISM
b) bluesnarfing b) 2.5 GHz ISM
c) bluestring c) 2.6 GHz ISM
d) bluescoping d) 2.7 GHz ISM

Answer: b Answer: a
Explanation: Unauthorised access of information Explanation: Bluetooth operates on 2.45 GHz
from a wireless device through a bluetooth frequency ISM band for transmission. It is used to
connection is called create a wireless personal area network for data
Bluesnarfing. It is done through exploiting the transfer up to a distance of 10 meters.
vulnerabilities of the Bluetooth device to steal
Subject : computer network security SEM: I
MCQs on Unit II : Wireless Network wireless devices to a wired network. A router
is the best example of an Access Point.
19. Bluetooth supports _______
a) point-to-point connections
b) point-to-multipoint connection 22. In wireless ad-hoc network _________ a)
c) both point-to-point connections and point access point is not required
to-multipoint connection b) access point is must
d) multipoint to point connection c) nodes are not required
d) all nodes are access points
Answer: c
Explanation: In Bluetooth, each slave node Answer: a
communicates with the master of the piconet Explanation: An ad-hoc wireless network is a
independently i.e. each master slave connection decentralized kind of a wireless network. An
is independent. The slave is not allowed to access point is usually a central device and it
communicate with other slaves directly. would go against the rules of the ad
hoc network to use one. Hence it is not
required.

20. A scatternet can have maximum


__________
a) 10 piconets 23. Which multiple access technique is used by
b) 20 piconets IEEE 802.11 standard for wireless LAN? a) CDMA
c) 30 piconets b) CSMA/CA
d) 40 piconets c) ALOHA
d) CSMA/CD
Answer: a
Explanation: A scatternet can have maximum of Answer: b
10 piconets and minimum of 2 piconets. To Explanation: CSMA/CA stands for Carrier sense
connect these piconets, a slave node of one multiple access/collision avoidance. It is a
piconet may act as a master in a piconet that is multiple access protocol used by IEEE 802.11
part of the scatternet. standard for wireless LAN. It’s based on the
principle of collision avoidance by using different
algorithms to avoid collisions between channels.
21. What is the access point (AP) in a wireless
LAN?
a) device that allows wireless devices to
connect to a wired network 24. In wireless distribution system __________ a)
b) wireless devices itself multiple access point are inter-connected with
c) both device that allows wireless devices to each other
connect to a wired network and wireless devices b) there is no access point
itself c) only one access point exists
d) all the nodes in the network d) access points are not required

Answer: a Answer: a
Explanation: Access point in a wireless Explanation: A Wireless Distribution System
network is any device that will allow the allows the connection of multiple access points
together. It is used to expand a wireless network
to a larger network.

Subject : computer network security SEM: I


MCQs on Unit II : Wireless Network

25. A wireless network interface controller can work 28. Which one of the following event is not
in _______ possible in wireless LAN?
a) infrastructure mode a) collision detection
b) ad-hoc mode b) acknowledgement of data frames c)
c) both infrastructure mode and ad-hoc mode d) multi-mode data transmission
WDS mode d) connection to wired networks

Answer: c Answer: a
Explanation: A wireless network interface Explanation: Collision detection is not possible in
controller works on the physical layer and the wireless LAN with no extensions. Collision
data link layer of the OSI model. Infrastructure detection techniques for multiple access like
mode WNIC needs access point but in ad-hoc CSMA/CD are used to detect collisions in
mode access point is not required. Wireless LANs.

26. In wireless network an extended service set 29. What is Wired Equivalent Privacy (WEP)? a)
is a set of ________ security algorithm for ethernet
a) connected basic service sets b) security algorithm for wireless networks c)
b) all stations security algorithm for usb communication d)
c) all access points security algorithm for emails
d) connected access points
Answer: b
Answer: a Explanation: WEP is a security algorithm for
Explanation: The extended service set is a part wireless network which intended to provide data
of the IEEE 802.11 WLAN architecture and is confidentiality comparable to that of traditional
used to expand the range of the basic service wired networks. It was
set by allowing connection of multiple basic introduced in 1997.
service sets.

30. What is WPA?


27. Mostly ________ is used in wireless LAN. a) a) wi-fi protected access
time division multiplexing b) wired protected access
b) orthogonal frequency division multiplexing c) c) wired process access
space division multiplexing d) wi-fi process access
d) channel division multiplexing
Answer: a
Answer: b Explanation: WPA or WiFi Protected Access is a
Explanation: In orthogonal frequency division security protocol used to provide users and firms
multiplexing, digital data is encoded on multiple with strong data security and protection for their
carrier frequencies. It is also used in digital wireless networks (WiFi) to give them confidence
television and audio broadcasting in addition to that only
Wireless LANs. authorized users can access their network.
a) Wide Local Area Network
b) Wireless Local Area Network
31. What is the full form of WLAN?

Subject : computer network security SEM: I


MCQs on Unit II : Wireless Network

c) Wireless Land Access Network


d) Wireless Local Area Node 34. Which of the following specifies a set of media
access control (MAC) and physical layer
Answer: b
Explanation: WLAN stands for Wireless Local
Area Network. Wireless networks is increasingly specifications for implementing WLANs? a)
used as a replacement for wires within homes, IEEE 802.16
buildings, and office settings through the b) IEEE 802.3
deployment of wireless local area networks c) IEEE 802.11
(WLANs). d) IEEE 802.15

Answer: c
32. WLANs use high power levels and generally Explanation: IEEE 802.11 is a set of media
require a license for spectrum use. a) True access control and physical layer
b) False specification for implementing WLAN computer
communication. It was founded in 1987 to begin
Answer: b standardization of spread spectrum WLANs for
Explanation: WLANs use low power and use in the ISM bands.
generally do not require a license for spectrum.
They provide ad hoc high data transmission rate
connections deployed by individuals. In the late 35. Which of the following is not a standard of
1980s, FCC provided licence free bands for low WLAN?
power spread spectrum devices in ISM band, a) HIPER-LAN
which is used by WLAN. b) HIPERLAN/2
c) IEEE 802.11b
d) AMPS
33. What is the name of 300 MHz of unlicensed
spectrum allocated by FCC in ISM band? Answer: d
a) UNII Explanation: AMPS is a standard of first
b) Unlicensed PCS generation network. HIPERLAN is a WLAN
c) Millimetre wave standard developed in Europe in mid 1990s.
d) Bluetooth HIPERLAN/2 is also developed in Europe that
provides upto 54 Mbps of user data.
Answer: a
Explanation: FCC allocated 300 MHz of
unlicensed spectrum in the ISM bands. This 36. Which of the following is the 802.11 High Rate
allocation is called the Unlicensed National Standard?
Information Infrastructure (UNII) band. It was a) IEEE 802.15
allocated for the express purpose of supporting b) IEEE 802.15.4
low power license free spread spectrum data c) IEEE 802.11g
communication. d) IEEE 802.11b

Answer: d
Explanation: IEEE 802.11b was a high rate
standard approved in 1999. It provided new data techniques were used in the original IEEE 802.11
rate capabilities of 11 Mbps, 5.5 Mbps standard?
in addition to the original 2 Mbps and 1 a) FHSS and DSSS
Mbps user rates of IEEE 802.11.

37. Which of the following spread spectrum

Subject : computer network security SEM: I


MCQs on Unit II : Wireless Network compatibility with 802.11b technologies.

b) THSS and FHSS


c) THSS and DSSS 40. What is the data rate of HomeRF 2.0? a)
d) Hybrid technique 10 Mbps
b) 54 Mbps
Answer: a c) 200 Mbps
Explanation: Original IEEE 802.11 used both the
approaches of FHSS (Frequency Hopping
Spread Spectrum) and DSSS (Direct Sequence d) 1 Mbps
Spread Spectrum). But from late 2001s, only
DSSS modems are used within IEEE 802.11. Answer: a
Explanation: HomeRF 2.0 has data rate of the
order of 10 Mbps. The FHSS proponents of IEEE
38. Which of the following WLAN standard has 802.11 have formed the HomeRF standard that
been named Wi-Fi? supports the frequency hopping equipment. In
a) IEEE 802.6 2001, HomeRF developed a 10 Mbps FHSS
b) IEEE 802.15.4 standard called HomeRF 2.0.
c) DSSS IEEE 802.11b
d) IEEE 802.11g
41. HIPER-LAN stands for ____________ a)
Answer: c High Precision Radio Local Area Network b)
Explanation: The DSSS IEEE 802.11b standard High Performance Radio Local Area Network
has been named Wi-Fi by the Wireless Ethernet c) High Precision Radio Land Area Network d)
Compatibility Alliance. It is a group that promotes Huge Performance Radio Link Access Node
adoption of 802.11 DSSS WLAN.
Answer: b
Explanation: HIPER-LAN stands for High
39. Which of the following is developing CCK Performance Radio Local Area Network. It was
OFDM? developed in Europe in mid 1990s. It was
a) IEEE 802.11a intended to provide individual wireless LANs for
b) IEEE 802.11b computer communication.
c) IEEE 802.15.4
d) IEEE 802.11g
42. What is the range of asynchronous user data
Answer: d rates provided by HIPER-LAN?
Explanation: IEEE 802.11g is developing a) 1-100 Mbps
CCK-OFDM (Complementary Code Keying b) 50-100 Mbps
Orthogonal Frequency Division Multiplexing) c) 1-20 Mbps
standards. It will support roaming d) 500 Mbps to 1 Gbps
capabilities and dual band use for public
WLAN networks. It also has backward Answer: c
Explanation: HIPER-LAN provides standard that provides user data rate upto 54
asynchronous user data rates of between 1 to 20 Mbps?
Mbps, as well as time bounded messaging of a) UNII
rates of 64 kbps to 2.048 Mbps. It uses 5.2 GHz b) WISP
and 17.1 GHz frequency bands. c) MMAC

43. What is the name of the European WLAN

Subject : computer network security SEM: I


MCQs on Unit II : Wireless

Network d) HIPERLAN/2 461. Which of the following is not an open


standard?
Answer: d a) Bluetooth
Explanation: HIPERLAN/2 has emerged as the b) WWW
next generation European WLAN standard. It c) HTML
provides upto 54 Mbps of user data to a variety d) VPN
of networks. The networks includes the ATM
backbone, IP based networks and the UMTS
network. Answer: d
Explanation: An open standard is a standard
that is publicly available. It has various rights
44. What is WISP? to use associated with it. Bluetooth is an open
a) Wideband Internet Service Protocol b) standard that has been embraced by over
Wireless Internet Service Provider c) Wireless thousand manufacturers of electronic
Instantaneous Source Provider d) Wideband appliances. VPN (Virtual Private Network) is a
Internet Source Protocol private network.

Answer: b
Explanation: WISP is wireless Internet Service 47. What is the nominal range of Bluetooth? a) 1
Provider used to explore public LANs (publican). Km
It builds a nationwide infrastructure of WLAN b) 10 m
access points in selected hotels, restaurants or c) 1 m
airports. It then charges a monthly subscription d) 10 Km
fee to users who wish to have always on
Internet access in those selected locations. Answer: b
Explanation: The power of the transmitter
governs the range over which a Bluetooth
45. The price of WLAN hardware is more than 3G device can operate. Generally, Bluetooth
telephones and fixed wireless equipment. a) True devices are said to fall into one of three
classes. The most common kind is class 2, and
b) False
it operates in 10 m range.
Answer: b
Explanation: As, WLAN could be used to
provide access for the last 100 meters into 48. Bluetooth standard is named after
homes and businesses. Therefore, the price of ___________
WLAN hardware is far below 3G telephones and a) King Ronaldo Bluetooth
fixed wireless equipment b) Pope Vincent Bluetooth
c) King Herald Bluetooth
d) Pope Francis Bluetooth
Answer: c
Explanation: Bluetooth standard is named after 49. Bluetooth operates in which band? a)
King Harald Bluetooth. He was the 10th century Ka Band
Viking who united Denmark and Norway. The b) L Band
Bluetooth standard aims to unify the c) Ku Band
connectivity chores of appliances within the d) 2.4 GHz ISM Band
personal workspace of an individual.

Subject : computer network security SEM: I


MCQs on Unit II : Wireless Network

Answer: d 52. Which modulation scheme is used by


Explanation: Bluetooth is a radio Bluetooth?
technology operating in 2.4 GHz frequency a) DQPSK
band. Bluetooth is best suited for low bandwidth b) MSK
applications like transferring sound data with c) GFSK
telephones (i.e. with a Bluetooth headset) or d) BPSK
byte data with hand held computers (transferring
files) or keyboard.
Answer: c
Explanation: Bluetooth uses GFSK
50. Which of the following scheme is used by (Gaussian Frequency Shift Keying). When GFSK
Bluetooth? is used for Bluetooth modulation, the frequency
a) Frequency hopping TDD scheme b) of the carrier is shifted to carry the modulation.
Frequency hopping FDD scheme c) By doing this the Bluetooth modulation achieves
DSSS TDD scheme a bandwidth of 1 MHz with stringent filter
d) DSSS FDD scheme requirements to prevent interference on other
channels.
Answer: a
Explanation: Frequency hopping TDD (Time
Division Duplexing) scheme is used by 53. What is the channel symbol rate in
Bluetooth. Frequency hopping provides a form of Bluetooth for each user?
multiple access among co-located devices in a) 270.833 Kbps
different piconets. b) 1 Gbps
c) 100 Mbps
d) 1 Mbps
51. What is the range of time slot in
Bluetooth? Answer: d
a) 120 milliseconds Explanation: Each user in Bluetooth uses a
b) 625 microseconds radio channel symbol rate of 1 Mbps using
c) 577 microseconds GFSK modulation. The frequency hopping
d) 5.7 seconds scheme of each Bluetooth user is
determined from a cyclic code with a length of
Answer: b 1027-1.
Explanation: Bluetooth uses a timeslot of 625
54. What is the raw channel bit error rate of
microseconds. A data channel hops randomly
Bluetooth?
1600 times per second between 79 RF
a) 10-3
channels. Thus, each channel is divided into
b) 10-10
time slots 625 microseconds.
c) 103
d) 10-1 Personal Area Networks (PAN)?
a) IEEE 802.11b
Answer: a b) IEEE 802.15
Explanation: Bluetooth has a bit error rate (BER) c) IEEE 802.11g
of 10-3. Bluetooth uses a number of forward d) IEEE 802.16
error control (FEC) coding and automatic repeat
request (ARR) schemes to achieve this bit rate. Answer: b
Explanation: IEEE 802.15 standards
55. Which of the following standard committee is formed to provide an
committee specifies Bluetooth and other

Subject : computer network security SEM: I


MCQs on Unit II : Wireless Network
C.FDMA
international forum for developing D.none of the above
Bluetooth and other PANs. PANs are used to
interconnect pocket PCs, personal digital 60. IEEE 802.11a, has a data rate of
_________Mbps.
assistants (PDAs), cell phones, light projectors
and other appliances. A.1

B.2
56. A Bluetooth network consists of _________
C.6
primary device(s) and up to _________ secondary
devices.

A.one; five D.none of the above

B.five; three 61. IEEE 802.11b, has a data rate of _________


Mbps.
C.two; six
A.1
D.one; seven
B.2
57. A Bluetooth network is called a _________.
C.5.5
A.piconet
D.none of the above
B.scatternet

C.bluenet
62. IEEE 802.11g, has a data rate of _________
D.none of the above Mbps.
58. Bluetooth is a _________ technology that A.1
connects devices (called gadgets) in a small area.
B.2
A.wired LAN
C.11
B.wireless LAN
D.22
C.VLAN
63. IEEE has defined the specifications for a
D.none of the above wireless LAN, called _________, which covers the
59. Bluetooth uses _________ method in the physical and data link layers.
physical layer to avoid interference from other A.IEEE 802.3
devices or other networks.
B.IEEE 802.5
A.DSSS
C.IEEE 802.11
B.FHSS
D.IEEE 802.2
Subject : computer network security SEM: I

You might also like