Search Header Logo

MWT .

Authored by Kay Lee

Other

University

Used 2+ times

MWT .
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Among the following WLAN configuration, which one of the configurations uses no access points?

Extended Service Set

Independent basic service set

Lightweight Access Point

Basic Service Set

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a wireless network, the digital signals are converted and transmitted from source to destination in the form of

Digital frequency

Radio wave frequency

Sea wave frequency

Air wave frequency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which of the following standard is recommended?

5 GHz provides Increased network capacity with up to 23 non-overlapping channels

5 GHz channel selection requires an autonomous access point

Adjacent cell with overlapping channel uses a repeater access point

Cells that overlap one another are configured to use non-overlapping

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker created a fake access point and targeted a victim machine to access data such as credit card information. Such type of attack is called

Man in the Middle attack

Malicious Association

Network Injection

Identity theft

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker uses an RF jammer and disturbs your communication. His intention is to perform?

Eavesdropping

Denial of service

Physical theft

Phishing attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A team leader wants to share a file with his team in the conference room where the signal strength is very poor. So, he decided to share it with Bluetooth. What type of network configuration mode it is treated as?

Mesh Network

Adhoc Network

Infrastructure Network

Star Network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless LAN will be deployed in a private hospital located in Kuching, Sarawak. Which criteria would be addressed when discussing a potential RF jamming attack?

Data Security

Physical Security

Wiring Closet Security

Access Point Security

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?