Business Data Networks And Security 9th Edition by Raymond R. Pank – Test Bank

$20.00

Category:

Description

INSTANT DOWNLOAD WITH ANSWERS

Business Data Networks And Security 9th Edition by Raymond R. Pank – Test Bank

Business Data Networks and Security, 9e (Panko)

Chapter 6  Wireless LANs I

 

1) Wireless network standards operate at ________.

  1. A) the data link layer
  2. B) the internet layer
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

2) Wireless network standards come from ________.

  1. A) OSI
  2. B) TCP/IP
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

3) Wireless LAN standards are created by the ________ Working Group.

  1. A) 802.1
  2. B) 802.3
  3. C) 802.11
  4. D) 802.3W

Answer:  C

 

4) Wireless access points typically link wireless clients to ________.

  1. A) wireless servers
  2. B) servers on the wired network
  3. C) Both A and B

Answer:  B

 

5) Wireless radio transmission usually is expressed in terms of ________.

  1. A) wavelength
  2. B) frequency
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

6) Frequency is measured in terms of ________.

  1. A) nanometers
  2. B) hertz
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

 

7) The other wireless device is far away in a known direction. You should use ________.

  1. A) an omnidirectional antenna
  2. B) a dish antenna
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

8) Cellular telephony uses ________.

  1. A) an omnidirectional antenna
  2. B) a dish antenna
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

9) Radio has more reliable transmission than UTP.

Answer:  FALSE

 

10) Attenuation with distance is faster with ________.

  1. A) UTP transmission
  2. B) radio transmission
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

11) If the signal strength at 20 meters is 90 mW, the signal strength at 60 meters would be 10 mW.

Answer:  FALSE

 

12) The most serious problem with wireless transmission in WLANs is ________.

  1. A) inverse square law attenuation
  2. B) absorptive attenuation
  3. C) shadow zones
  4. D) multipath interference

Answer:  D

 

13) What propagation problem becomes worse as frequency increases?

  1. A) Inverse square law attenuation.
  2. B) Electromagnetic interference.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

 

14) What propagation problem becomes worse as frequency increases?

  1. A) Absorptive attenuation.
  2. B) Electromagnetic interference.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

15) What propagation problem becomes worse as frequency increases?

  1. A) Absorptive attenuation.
  2. B) Shadow zones.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

16) The frequency spectrum extends ________.

  1. A) into the gigahertz range
  2. B) into the visible light range
  3. C) into the ultraviolet range
  4. D) to infinity

Answer:  D

 

17) The total range of possible 802.11 WLAN frequencies in the 2.4 GHz band constitutes ________.

  1. A) a frequency spectrum
  2. B) a broadband
  3. C) a channel
  4. D) a service band

Answer:  D

 

18) The terms channel and service band mean roughly the same thing.

Answer:  FALSE

 

19) To handle multiple conversations in radio transmission, you use multiple ________.

  1. A) channels
  2. B) frequencies
  3. C) service bands
  4. D) wires

Answer:  A

 

20) Signals usually ________.

  1. A) travel at a single frequency
  2. B) spread over a range of frequencies

Answer:  B

 

 

21) A channel extends from 55 MHz to 60 MHz. Its bandwidth is ________.

  1. A) 60 MHz
  2. B) 55 MHz
  3. C) 65 MHz
  4. D) None of the above

Answer:  D

 

22) To transmit very rapidly in RADIO, you need ________.

  1. A) single-frequency transmission
  2. B) single-mode transmission
  3. C) wide bandwidth
  4. D) narrow bandwidth

Answer:  C

 

23) Channels with wide bandwidths are called ________ channels.

  1. A) multimode
  2. B) full-duplex
  3. C) broadband
  4. D) modulated

Answer:  C

24) To transmit data very rapidly, you would want a ________ channel.

  1. A) narrowband
  2. B) broadband
  3. C) single-frequency band
  4. D) Any of the above

Answer:  B

 

25) Networks that are fast are often called broadband whether or not they use radio channels.

Answer:  TRUE

 

26) In the Shannon Equation, C is the ________.

  1. A) actual speed of transmission in a channel
  2. B) maximum possible speed of transmission in a channel
  3. C) minimum possible speed of transmission in a channel
  4. D) channel bandwidth

Answer:  B

 

27) In the Shannon Equation, if you quadruple the bandwidth in a channel while the signal-to-noise ratio remains the same, you can transmit ________.

  1. A) Log2(1+4) times as fast
  2. B) Log2(1+1/4) times as fast
  3. C) about 4 times as fast
  4. D) at the same speed, but more reliably

Answer:  C

 

 

28) The frequency range from 500 megahertz to 10 gigahertz is called the ________.

  1. A) frequency spectrum
  2. B) commercial mobile service band
  3. C) unlicensed band
  4. D) golden zone

Answer:  D

 

29) If a radio transmission is easily blocked by obstacles, then you need to maintain ________.

  1. A) a clear line of sight
  2. B) spread spectrum transmission interference
  3. C) broadband transmission
  4. D) deep transmission

Answer:  A

 

30) WLANs normally use ________.

  1. A) licensed bands
  2. B) unlicensed bands

Answer:  B

 

31) In unlicensed bands, ________.

  1. A) you can use radios wherever you please
  2. B) you can prevent nearby businesses from setting up access points in the same channel
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

32) Interference is minimized in ________.

  1. A) licensed bands
  2. B) unlicensed bands

Answer:  A

 

33) 802.11 standards are being developed to work in the ________ unlicensed band.

  1. A) 2.4 GHz
  2. B) 5 GHz
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

34) In 802.11, channel bandwidth usually is ________.

  1. A) 20 GHz
  2. B) 40 GHz
  3. C) 20 MHz
  4. D) 40 MHz

Answer:  C

 

 

35) Which unlicensed band is defined the same way in most countries around the world?

  1. A) 2.4 GHz.
  2. B) 5 GHz.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

36) Which unlicensed band provides greater propagation distance for a given level of power?

  1. A) 2.4 GHz.
  2. B) 5 GHz.
  3. C) Both A and B allow about the same propagation distance.

Answer:  A

 

37) The 2.4 GHz band supports ________ nonoverlapping 20 MHz channel(s).

  1. A) 1
  2. B) 3
  3. C) 7
  4. D) 11

Answer:  B

 

38) The 5 GHz band supports about ________ nonoverlapping 20 MHz channel(s).

  1. A) 1
  2. B) 3
  3. C) 6
  4. D) 12

Answer:  D

 

39) Spread spectrum transmission is used in WLANs because ________.

  1. A) it is required by regulators
  2. B) it offers strong security
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

40) Spread spectrum transmission is used in WLANs for ________.

  1. A) higher transmission speed
  2. B) more reliable transmission
  3. C) greater security
  4. D) All of the above

Answer:  B

 

41) Spread spectrum transmission is used in commercial WLANs for security reasons.

Answer:  FALSE

 

 

42) A channel has more bandwidth than is necessary given data transmission speeds requirements in ________ transmission.

  1. A) normal radio
  2. B) reliable commercial
  3. C) spread spectrum
  4. D) licensed

Answer:  C

 

43) Which of the following uses OFDM?

  1. A) 802.11g.
  2. B) 802.11n.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

44) When a WLAN is in use, the distribution system is the ________.

  1. A) collection of access points
  2. B) Ethernet network
  3. C) radio transmitter in an access point
  4. D) radio transmitter in the access point controller

Answer:  B

 

45) Access points take frames from wireless devices and send these frames on to devices on the wired LAN.

Answer:  FALSE

 

46) Access points take ________ from wireless devices and send them on to devices on the wired LAN. They also do the converse.

  1. A) packets
  2. B) frames
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

47) A wireless host sends a packet to a server on the company’s wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission?

  1. A) 1
  2. B) 2
  3. C) 4
  4. D) There will be one frame for each switch along the way.

Answer:  B

 

48) An access point and the set of hosts it serves is called a(n) ________.

  1. A) BSS
  2. B) BSSID
  3. C) ESS
  4. D) None of the above

Answer:  A

 

49) The ________ is the identifier in a basic service set.

  1. A) BSS
  2. B) BSSID
  3. C) SSID

Answer:  B

 

50) To connect to an access point, you must know its ________.

  1. A) BSS
  2. B) DSS
  3. C) ESS
  4. D) None of the above

Answer:  D

 

51) When a host moves from one wireless access point to another in a WLAN, this is ________.

  1. A) a handoff
  2. B) roaming
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

52) In 802.11 WLANs, the terms handoff and roaming mean the same thing.

Answer:  TRUE

 

53) An extended service set (ESS) is a group of BSSs that ________.

  1. A) are connected to the same distribution system
  2. B) have the same SSID
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

54) In an extended service set, each access point ________.

  1. A) must have the same SSID
  2. B) must have different SSIDs
  3. C) must have coordinated SSIDs
  4. D) None of the above

Answer:  A

 

 

55) The standard for roaming among access points is ________.

  1. A) 802.11r
  2. B) 802.11s
  3. C) 802.11W
  4. D) None of the above

Answer:  A

56) What happens if two nearby access points use the same channel?

  1. A) They will interfere with each other.
  2. B) They will be bonded for joint operation automatically.
  3. C) They will be bonded for joint operation automatically if they use CSMA/CA+ACK.
  4. D) They will be bonded for joint operation automatically if they use RTS/CTS.

Answer:  A

 

57) There is an access point that serves eight wireless hosts. On how many channels will these devices transmit during the course of an hour or two?

  1. A) 1
  2. B) 2
  3. C) 7
  4. D) 8

Answer:  A

 

58) ________ is a technique for preventing two wireless stations from transmitting at the same time and therefore interfering with each other.

  1. A) Creating extended service sets
  2. B) Roaming
  3. C) The distribution system
  4. D) Media access control

Answer:  D

 

59) An access point and a host it serves can transmit to each other simultaneously.

Answer:  FALSE

 

60) Media access control governs transmission by ________.

  1. A) access points
  2. B) wireless hosts
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

61) When a wireless NIC wishes to transmit, it listens for traffic. If there is traffic, it waits. If there is no traffic, it may transmit.

  1. A) True.
  2. B) Sometimes true.
  3. C) False.

Answer:  B

 

62) When a wireless NIC using CSMA/CD receives a frame correctly, it immediately sends back a reply without listening for traffic.

Answer:  TRUE

 

63) CSMA/CA+ACK is reliable.

Answer:  TRUE

 

64) CSMA/CA+ACK is ________.

  1. A) efficient
  2. B) inefficient

Answer:  B

65) In ________, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a response, the host sending the original message may transmit. All other hosts must wait.

  1. A) CSMA/CA+ACK
  2. B) CSMA/CA
  3. C) CSMA/CD
  4. D) RTS/CTS

Answer:  D

 

66) CSMA/CA+ACK usually is ________.

  1. A) required
  2. B) optional

Answer:  A

 

67) Which of the following is usually optional in access point operation?

  1. A) CSMA/CA+ACK.
  2. B) RTS/CTS.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

68) Which of the following is more efficient?

  1. A) CSMA/CA+ACK.
  2. B) RTS/CTS.
  3. C) Both are about equally efficient.

Answer:  A

 

69) Which of the following is a full, according to the book?

  1. A) 802.11ac.
  2. B) 802.11ad.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

 

70) Which of the following is a draft standard, according to the book?

  1. A) 802.11g.
  2. B) 802.11n.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

71) For which standard is 300 Mbps a typical rated speed?

  1. A) 802.11ac.
  2. B) 802.11ad.
  3. C) 802.11g.
  4. D) 802.11n.

Answer:  D

72) For which of the following is 100 meters a typical service distance?

  1. A) 802.11g.
  2. B) 802.11n.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

73) Which of the following brings gigabit speeds to clients?

  1. A) 802.11ac
  2. B) 802.11g
  3. C) 802.11n
  4. D) None of the above

Answer:  A

 

74) For wireless backup, which of the following is adequate?

  1. A) 802.11ac
  2. B) 802.11g
  3. C) 802.11n
  4. D) All of the above

Answer:  A

 

75) Which of the following uses OFDM?

  1. A) 802.11g
  2. B) 802.11ac
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

 

76) Wider channel bandwidth ________.

  1. A) decreases transmission speed
  2. B) allows more channels to be used in a service band
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

77) Which of the following can operate in the 5 GHz band?

  1. A) 802.11g
  2. B) 802.11ac
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

78) In the 5 GHz band, how many channels can you have with 802.11ac with 80 GHz channels?

  1. A) 1
  2. B) 6
  3. C) 12
  4. D) 24

Answer:  B

79) In the 60 GHz service band, ________.

  1. A) signals travel farther
  2. B) channel bandwidth can be very wide
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

80) MIMO ________.

  1. A) bonds channels for higher speed
  2. B) is used in all forms of 802.11
  3. C) uses a single spatial stream but multiple signals
  4. D) transmits multiple signals in the same channel

Answer:  D

 

81) MIMO allows you to transmit two signals in the same channel.

Answer:  TRUE

 

82) MIMO ________.

  1. A) increases throughput
  2. B) lowers propagation distance
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

 

83) Beamforming can ________.

  1. A) direct signal strength at individual wireless hosts
  2. B) transmit multiple spatial data streams in the same channel
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

84) Beamforming can allow an access point to ________.

  1. A) direct power to individual clients
  2. B) send signals to two different clients at the same time
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

85) Traditional MIMO can ________

  1. A) send multiple signals in the same channel
  2. B) send signals to two different clients at the same time
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

86) Another name for beamforming is having a smart antenna.

Answer:  TRUE

87) In 802.11 networks, the speed I receive on my portable devices is a(n) ________.

  1. A) aggregate throughput
  2. B) individual throughput
  3. C) rated speed
  4. D) None of the above

Answer:  B

 

88) If more users move to an access point, this decreases ________.

  1. A) individual throughput
  2. B) aggregate throughput
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

89) As a station moves away from an access point, the access point transmits more slowly to it.

Answer:  TRUE

 

90) The presence of a client that is distant from the access point reduces the individual throughput of other clients served by that access point.

Answer:  TRUE

 

 

91) If an 802.11n access point and an 802.11g client communicate, they communicate using ________.

  1. A) 802.11g
  2. B) 802.11n
  3. C) Either A or B
  4. D) Neither A nor B

Answer:  A

 

92) Using unused transmission channels in a service band is called using ________.

  1. A) dark spectrum
  2. B) a smart antenna
  3. C) opportunistic agility
  4. D) white space

Answer:  D

 

93) Two wireless devices communicate via Wi-Fi Direct using ________.

  1. A) an access point that lets them talk directly
  2. B) an Ethernet network to connect their access points
  3. C) Either A or B
  4. D) Neither A nor B

Answer:  D

 

94) Mesh networking in 802.11 is likely to use ________.

  1. A) only wireless devices
  2. B) wireless devices and the site’s wired LAN
  3. C) Both A and B

Answer:  A

95) The 802.11 standard for mesh networking is ________.

  1. A) 802.11m
  2. B) 802.11r
  3. C) 802.11ac
  4. D) None of the above

Answer:  A

 

96) Two WLAN products that conform to the same standard will have almost equal performance.

Answer:  FALSE

 

97) If a wireless client only has two MIMO antennas, an access point with three MIMO antennas will produce better performance than an access point with two MIMO antennas.

Answer:  TRUE

 

Business Data Networks and Security, 9e (Panko)

Chapter 7  Wireless LANs II

 

1) To drive around a city looking for working access points that are unprotected is ________.

  1. A) drive-by hacking
  2. B) war driving

Answer:  B

 

2) Breaking into WLANs is ________.

  1. A) drive-by hacking
  2. B) war driving

Answer:  A

 

3) An unauthorized internal access point is a(n) ________.

  1. A) evil twin access point
  2. B) rogue access point

Answer:  B

 

4) A rogue access point is an unauthorized access point.

Answer:  TRUE

 

5) What security protocol originally came with 802.11 equipment?

  1. A) 802.11e
  2. B) 802.11i
  3. C) WPA
  4. D) WEP

Answer:  D

 

6) What security protocol originally came with 802.11 equipment?

  1. A) 802.11i
  2. B) WEP
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

7) How long does it take an attacker to crack WEP today with readily available software?

  1. A) About ten seconds.
  2. B) About ten minutes.
  3. C) About ten hours.
  4. D) WEP cannot be cracked with readily available software.

Answer:  A

 

8) WEP is so strong that it cannot be cracked with readily available software.

Answer:  FALSE

 

9) WEP is a strong core security protocol.

Answer:  FALSE

10) Who created WPA?

  1. A) The Internet Engineering Task Force.
  2. B) The 802.1 Working Group.
  3. C) The 802.11 Working Group.
  4. D) The Wi-Fi Alliance.

Answer:  D

 

11) WPA was created by the Internet Engineering Task Force.

Answer:  FALSE

 

12) 802.11i is attractive compared with WPA because ________.

  1. A) 802.11i offers stronger security
  2. B) 802.11i offers quality of service
  3. C) 802.11i was standardized by the Wi-Fi Alli
  4. D) All of the above

Answer:  A

 

13) Which of the above offers stronger security?

  1. A) WPA
  2. B) 802.11i
  3. C) Both A and B offer equally strong security.

Answer:  A

 

14) 802.11i offers stronger security than WPA.

Answer:  TRUE

 

15) What is the strongest security protocol for 802.11 today?

  1. A) 802.11i
  2. B) 802.11s
  3. C) 802.11X
  4. D) WPA

Answer:  A

 

16) What does the Wi-Fi Alliance call 802.11i?

  1. A) 802.1x
  2. B) 802.11X
  3. C) WPA
  4. D) WPA2

Answer:  D

 

17) 802.11i and WPA2 are different names for the same standard.

Answer:  TRUE

 

 

18) 802.11i uses ________ as its encryption method.

  1. A) RC4
  2. B) 802.11s
  3. C) AES-CCMP
  4. D) WPA

Answer:  C

 

19) 802.11i uses WEP as its encryption method.

Answer:  FALSE

20) WPA ________.

  1. A) has not been cracked at all
  2. B) has been partially cracked
  3. C) has been fully cracked but the crack is difficult
  4. D) has been fully cracked and the crack only takes minutes

Answer:  B

 

21) In what mode of 802.11i operation is a central authentication server used?

  1. A) 802.1X mode.
  2. B) PSK mode.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

22) A central authentication server is used in 802.11i PSK mode.

Answer:  FALSE

 

23) The Wi-Fi Alliance refers to 802.1X mode as ________ mode.

  1. A) AES
  2. B) PSK
  3. C) enterprise
  4. D) EAP

Answer:  A

 

24) 802.1X needs security between the authenticator and the computer in ________.

  1. A) Ethernet
  2. B) 802.11i
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

25) 802.1X needs security between the authenticator and the computer in Ethernet.

Answer:  FALSE

 

26) 802.1X needs security between the authenticator and the computer in 802.11 wireless access.

Answer:  FALSE

 

27) The most popular standard for extended 802.1X security is ________.

  1. A) EAP-TTLS
  2. B) MS-EAP
  3. C) EAP-TLS
  4. D) PEAP

Answer:  D

 

28) In 802.11i ________, hosts must know a shared initial key.

  1. A) 802.1X mode
  2. B) PSK mode
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

29) PSK mode automatically prevents the use of weak keys.

Answer:  FALSE

 

30) In 802.11i PSK mode, the pass phrase should be at least ________ characters long.

  1. A) 6
  2. B) 8
  3. C) 20
  4. D) 128

Answer:  C

 

31) A notebook computer configured to act like a real access point is a(n) ________.

  1. A) evil twin access point
  2. B) rogue access point

Answer:  A

 

32) A notebook computer configured to act like a real access point is a rogue access point.

Answer:  FALSE

 

33) If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).

  1. A) one
  2. B) two
  3. C) four
  4. D) 16

Answer:  B

 

34) Which of the following is usually set up by a hacker outside the building?

  1. A) A rogue access point.
  2. B) An evil twin access point.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

35) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

  1. A) VLANs.
  2. B) VPNs.
  3. C) PEAP.
  4. D) All of the above

Answer:  B

 

36) In VPNs designed to frustrate evil twin attacks, the shared secret ________.

  1. A) is transmitted in the clear
  2. B) is transmitted with cryptographic protections
  3. C) is not transmitted
  4. D) Any of the above

Answer:  C

37) WPS is applicable to ________.

  1. A) 802.1X mode
  2. B) Preshared key mode
  3. C) PEAP
  4. D) IPsec

Answer:  B

 

38) Which of the following has a dangerous vulnerability that is causing problems today?

  1. A) PEAP
  2. B) 802.11i
  3. C) WPA
  4. D) WPS

Answer:  A

 

39) A denial-of-service attack against a wireless network can be implemented by ________.

  1. A) flooding the network with traffic
  2. B) sending disassociate commands to clients
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

40) Initial WLAN planning begins with drawing circles on building architecture drawings.

Answer:  TRUE

 

41) Centralized access point management ________.

  1. A) increases management costs but provides better control
  2. B) reduces management costs

Answer:  B

 

42) Centralized access point management raises management costs.

Answer:  FALSE

 

43) Which of the following can be used to centrally manage remote access points?

  1. A) Smart access points.
  2. B) WLAN switches.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

44) Managed access points should ________.

  1. A) allow access point power to be adjusted remotely
  2. B) provide constant transmission quality monitoring
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

45) Managed access points should ________.

  1. A) identify rogue access points
  2. B) be able to push updates out to access points
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

46) An 8/1 increase in power corresponds to approximately ________ decibels.

  1. A) 3
  2. B) 6
  3. C) 20
  4. D) None of the above

Answer:  D

 

47) A 100/1 increase in power corresponds to approximately ________ decibels.

  1. A) 6
  2. B) 10
  3. C) 20
  4. D) None of the above

Answer:  C

 

48) An 8/1 decrease in power corresponds to approximately ________ decibels.

  1. A) 3
  2. B) 6
  3. C) 9
  4. D) None of the above

Answer:  D

 

 

49) 1 Watt represents a dBm value of about ________.

  1. A) 10
  2. B) 20
  3. C) 30
  4. D) We cannot say because only one power is given.

Answer:  C

 

50) 2 mW represents a dBm value of about ________.

  1. A) 2
  2. B) 3
  3. C) 20
  4. D) We cannot say because only one power is given.

Answer:  B

 

51) I wish to have a wireless LAN to serve my house. I will use ________.

  1. A) 802.11
  2. B) Bluetooth
  3. C) Either A or B

Answer:  A

 

52) Bluetooth is for ________.

  1. A) large WLANs
  2. B) cable replacement
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

53) Which of the following was created for PANs?

  1. A) 802.11
  2. B) Bluetooth
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

54) Bluetooth is standardized by the ________.

  1. A) 802.11 Working Group
  2. B) Wi-Fi Alliance
  3. C) Bluetooth Special Interest Group
  4. D) None of the above

Answer:  C

 

55) Which form of Bluetooth has a typical transmission speed of about 200 kbps?

  1. A) Classic Bluetooth.
  2. B) High-Speed Bluetooth.
  3. C) Low-Energy Bluetooth.
  4. D) None of the above

Answer:  C

 

56) Which form of Bluetooth has a typical transmission speed of about 3 Mbps?

  1. A) Classic Bluetooth.
  2. B) High-Speed Bluetooth.
  3. C) Low-Energy Bluetooth.
  4. D) None of the above

Answer:  A

 

57) Which form of Bluetooth has a typical transmission speed of about 24 Mbps?

  1. A) Classic Bluetooth.
  2. B) High-Speed Bluetooth.
  3. C) Low-Energy Bluetooth.
  4. D) None of the above

Answer:  B

 

58) Which of the following can use access points?

  1. A) 802.11
  2. B) Bluetooth
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

59) In Bluetooth, a master may have multiple slaves.

Answer:  TRUE

 

60) At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master?

  1. A) The Bluetooth phone.
  2. B) The Bluetooth headset.
  3. C) Both are simultaneously masters and slaves.

Answer:  B

61) In Bluetooth, a master can have up to ________ slaves at any moment.

  1. A) 1
  2. B) 3
  3. C) 12
  4. D) None of the above

Answer:  D

 

62) Two Bluetooth devices will peer ________.

  1. A) the first time they connect
  2. B) every time they connect
  3. C) never
  4. D) after they have first bonded

Answer:  A

 

 

63) Two devices exchange information about the profiles they support during ________.

  1. A) peering
  2. B) bonding
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

 

64) Which Bluetooth profile would a tablet use with a Bluetooth keyboard?

  1. A) Bluetooth input profile.
  2. B) Bluetooth I/O profile.
  3. C) Human interface device profile.
  4. D) None of the above

Answer:  C

 

65) A mobile phone may communicate a headset using the Bluetooth ________ profile.

  1. A) hands-free
  2. B) headset
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  C

 

66) A mobile phone will communicate with more functionality with a headset if it uses the Bluetooth ________.

  1. A) hands-free profile
  2. B) headset profile
  3. C) Both have about equal functionality.

Answer:  A

 

67) Bluetooth uses the ________ service band.

  1. A) 2.4 GHz
  2. B) 5 GHz
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  A

68) Classic Bluetooth uses ________.

  1. A) OFDM
  2. B) Frequency Hopping Spread Spectrum
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  B

 

 

69) Near-field communication has a maximum transmission distance of about ________.

  1. A) 400 cm / 200 in
  2. B) 40 cm / 20 in
  3. C) 4 cm / 2 in
  4. D) The devices must be physically touching.

Answer:  C

 

70) In which frequency band can NFC operate?

  1. A) 2.4 GHz.
  2. B) 5 GHz.
  3. C) Both A and B
  4. D) Neither A nor B

Answer:  D

 

71) A typical speed for NFC is about ________.

  1. A) 2 kbps
  2. B) 200 kbp
  3. C) 2 Mbps
  4. D) 200 Mbps

Answer:  B

 

72) Passive RFID chips are powered by ________.

  1. A) a battery
  2. B) the sun
  3. C) body temperature
  4. D) the signal sent by the device querying the RFID chip

Answer:  A

 

73) Hackers cannot eavesdrop on near-field communication transmissions unless they are almost right next to the device.

Answer:  FALSE

 

74) UWB channels are wider than a full service band.

Answer:  TRUE

 

75) Compared to 802.11, UWB has greater ________.

  1. A) speed
  2. B) transmission distance
  3. C) reliability
  4. D) All of the above

Answer:  A