
Wireless Communication Technologies Quiz
Authored by Edgar Flores
Computers
10th Grade
Used 9+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection. Which technology should Sherry suggest?
NFC technology can be used to connect mobile devices to speakers
WLANs can be used to connect mobile devices to speakers
RFID technology can be used to connect laptop mouse without any wired connection
Bluetooth technology can be used to connect devices without any wired connection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate an IoT device?
Narrowband IoT
Subscriber identity module
Zigbee
Cellular IoT baseband
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which type of RFID attack can unauthorized users listen to communications between RFID tags and readers?
Eavesdropping
Data theft
Unauthorized tag access
Fake tags
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?
Evil twin
Wireless denial of service attacks
Rogue access point
Jamming
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?
Bluesnarfing
NFC attack
Bluejacking
RFID attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which wireless probe can be designed by configuring a laptop computer to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?
Dedicated probes
Wireless device probe
Access point probe
Desktop probe
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why are jamming attacks generally rare?
The transmitter is not very powerful and must be close to the target
They can't get around new IEEE amendments that fully protect WLANs
They require expensive, sophisticated equipment
They can't identify WLAN RF signals from other device signals
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?