Unit 14 Review Day 1

Unit 14 Review Day 1

45 Qs

quiz-placeholder

Similar activities

11th Grade Semester 2 Exam Review

11th Grade Semester 2 Exam Review

12th Grade

41 Qs

AAS BAHASA INGGRIS KELAS X SMT II

AAS BAHASA INGGRIS KELAS X SMT II

KG - University

50 Qs

CSS 9 REVIEW

CSS 9 REVIEW

KG - University

50 Qs

ACE Set K for share

ACE Set K for share

KG - University

50 Qs

For Workshop Week25

For Workshop Week25

KG - University

48 Qs

Датабэйз 1-50

Датабэйз 1-50

KG - University

50 Qs

EOC practice

EOC practice

KG - University

45 Qs

INFORMATIKA_8

INFORMATIKA_8

KG - University

50 Qs

Unit 14 Review Day 1

Unit 14 Review Day 1

Assessment

Quiz

others

Medium

Created by

Nathan Krahn

Used 2+ times

FREE Resource

45 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

1. Select the best description of a cellular network.
A network for mobile devices where the service area is divided into cells
A network for mobile devices where the service area is divided into cellular functions
A database for mobile devices where the service area is divided into cells
A network for mobile devices where the area codes are divided into cells

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

2. Which of the following is NOT a security concerns of a cellular network?
Worldwide access
Encrypted communications
Traffic monitoring
Location tracking

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

3. What can WiFi frequency interference result in?
Integrity Attack
Deception Attack
Denial of Service Attack
Data exfiltration Attack

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

4. What is an alternative to a cellular network in the event of a disaster?
Satellite Network
Encrypted Network
Backup Network
High Throughput Network

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

5. NFC Frequency jamming can result in a DoS attack.
True
False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

6. What is ANT/ANT+?
Wired Sensor Network Protocol
Wireless Sensor Network Protocol
Wireless Sensor Antenna Protocol
Wireless Sensor Data Feed

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

7. What attack can result due to IR being enabled on mobile devices?
Unauthorized file transfers through sniffing IR traffic
Authorized file transfers through sniffing IR traffic
Unauthorized disk transfers through sniffing IR traffic
Authorized file transfers through locating IR traffic

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?