
MWT .
Authored by Kay Lee
Other
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
25 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Among the following WLAN configuration, which one of the configurations uses no access points?
Extended Service Set
Independent basic service set
Lightweight Access Point
Basic Service Set
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In a wireless network, the digital signals are converted and transmitted from source to destination in the form of
Digital frequency
Radio wave frequency
Sea wave frequency
Air wave frequency
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Several new coverage cells are required to improve the Wi-Fi network of an organization. Which of the following standard is recommended?
5 GHz provides Increased network capacity with up to 23 non-overlapping channels
5 GHz channel selection requires an autonomous access point
Adjacent cell with overlapping channel uses a repeater access point
Cells that overlap one another are configured to use non-overlapping
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker created a fake access point and targeted a victim machine to access data such as credit card information. Such type of attack is called
Man in the Middle attack
Malicious Association
Network Injection
Identity theft
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A hacker uses an RF jammer and disturbs your communication. His intention is to perform?
Eavesdropping
Denial of service
Physical theft
Phishing attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A team leader wants to share a file with his team in the conference room where the signal strength is very poor. So, he decided to share it with Bluetooth. What type of network configuration mode it is treated as?
Mesh Network
Adhoc Network
Infrastructure Network
Star Network
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A wireless LAN will be deployed in a private hospital located in Kuching, Sarawak. Which criteria would be addressed when discussing a potential RF jamming attack?
Data Security
Physical Security
Wiring Closet Security
Access Point Security
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
UQ College Agent Quiz Australiana
Quiz
•
University
20 questions
second gathering
Quiz
•
University
20 questions
QUIZ PRODI DAY
Quiz
•
University
20 questions
BUS 1038 - Practice Test 2 - Part 1
Quiz
•
University
20 questions
THE TIME VALUE OF MONEY & INVESTMENT ANALYSIS
Quiz
•
University
20 questions
Noun Clause Introduction
Quiz
•
University
20 questions
Microsoft Excel
Quiz
•
KG - Professional Dev...
20 questions
Planes
Quiz
•
3rd Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
20 questions
Figurative Language Review
Quiz
•
6th Grade
Discover more resources for Other
12 questions
IREAD Week 4 - Review
Quiz
•
3rd Grade - University
23 questions
Subject Verb Agreement
Quiz
•
9th Grade - University
7 questions
Force and Motion
Interactive video
•
4th Grade - University
7 questions
Renewable and Nonrenewable Resources
Interactive video
•
4th Grade - University
5 questions
Poetry Interpretation
Interactive video
•
4th Grade - University
19 questions
Black History Month Trivia
Quiz
•
6th Grade - Professio...
15 questions
Review1
Quiz
•
University
15 questions
Pre1
Quiz
•
University