Wireless Communication Technologies Quiz

Wireless Communication Technologies Quiz

10th Grade

21 Qs

quiz-placeholder

Similar activities

Cisco IT Essentials Old Laptops and Mobile Devices

Cisco IT Essentials Old Laptops and Mobile Devices

9th - 12th Grade

16 Qs

A+ 1001 Domain 1 Review

A+ 1001 Domain 1 Review

10th - 11th Grade

18 Qs

WJEC 1.3.1 Communications - Networks and Network Hardware

WJEC 1.3.1 Communications - Networks and Network Hardware

9th - 10th Grade

19 Qs

IT Jobs and Careers

IT Jobs and Careers

9th - 12th Grade

16 Qs

Module 22 - Wireless Networking 1

Module 22 - Wireless Networking 1

9th - 12th Grade

18 Qs

Network Hardware

Network Hardware

10th - 11th Grade

18 Qs

OCR GCSE Computer Science: 1.4 Networks (Part 2)

OCR GCSE Computer Science: 1.4 Networks (Part 2)

10th Grade

25 Qs

C3 Mobile & Other Device Security

C3 Mobile & Other Device Security

10th - 12th Grade

23 Qs

Wireless Communication Technologies Quiz

Wireless Communication Technologies Quiz

Assessment

Quiz

Computers

10th Grade

Hard

Created by

Edgar Flores

Used 4+ times

FREE Resource

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection. Which technology should Sherry suggest?

NFC technology can be used to connect mobile devices to speakers

WLANs can be used to connect mobile devices to speakers

RFID technology can be used to connect laptop mouse without any wired connection

Bluetooth technology can be used to connect devices without any wired connection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate an IoT device?

Narrowband IoT

Subscriber identity module

Zigbee

Cellular IoT baseband

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of RFID attack can unauthorized users listen to communications between RFID tags and readers?

Eavesdropping

Data theft

Unauthorized tag access

Fake tags

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?

Evil twin

Wireless denial of service attacks

Rogue access point

Jamming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?

Bluesnarfing

NFC attack

Bluejacking

RFID attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which wireless probe can be designed by configuring a laptop computer to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?

Dedicated probes

Wireless device probe

Access point probe

Desktop probe

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are jamming attacks generally rare?

The transmitter is not very powerful and must be close to the target

They can't get around new IEEE amendments that fully protect WLANs

They require expensive, sophisticated equipment

They can't identify WLAN RF signals from other device signals

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?