
Wireless Communication Technologies Quiz
Authored by Edgar Flores
Computers
10th Grade
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
21 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection. Which technology should Sherry suggest?
NFC technology can be used to connect mobile devices to speakers
WLANs can be used to connect mobile devices to speakers
RFID technology can be used to connect laptop mouse without any wired connection
Bluetooth technology can be used to connect devices without any wired connection
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate an IoT device?
Narrowband IoT
Subscriber identity module
Zigbee
Cellular IoT baseband
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In which type of RFID attack can unauthorized users listen to communications between RFID tags and readers?
Eavesdropping
Data theft
Unauthorized tag access
Fake tags
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?
Evil twin
Wireless denial of service attacks
Rogue access point
Jamming
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?
Bluesnarfing
NFC attack
Bluejacking
RFID attack
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which wireless probe can be designed by configuring a laptop computer to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?
Dedicated probes
Wireless device probe
Access point probe
Desktop probe
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why are jamming attacks generally rare?
The transmitter is not very powerful and must be close to the target
They can't get around new IEEE amendments that fully protect WLANs
They require expensive, sophisticated equipment
They can't identify WLAN RF signals from other device signals
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
22 questions
одномерные массивы
Quiz
•
10th Grade
20 questions
Hardware and Software
Quiz
•
8th - 11th Grade
17 questions
Security and Ethics
Quiz
•
9th - 12th Grade
21 questions
Computer System
Quiz
•
9th - 11th Grade
20 questions
Design your website
Quiz
•
7th - 12th Grade
20 questions
Artificial Intelligence and SketchUp
Quiz
•
8th - 10th Grade
16 questions
OCR Sys Arch J277
Quiz
•
10th - 12th Grade
20 questions
Colour Theory
Quiz
•
3rd Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade