Search Header Logo

Wireless Communication Technologies Quiz

Authored by Edgar Flores

Computers

10th Grade

Used 6+ times

Wireless Communication Technologies Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

21 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Sherry needs to suggest a technology that can enable smartphones or laptops to control multiple devices like speakers, mice, etc., within a 100-meter distance. The device should also be connected without any wired connection. Which technology should Sherry suggest?

NFC technology can be used to connect mobile devices to speakers

WLANs can be used to connect mobile devices to speakers

RFID technology can be used to connect laptop mouse without any wired connection

Bluetooth technology can be used to connect devices without any wired connection

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology under wireless communication is an integrated circuit that securely stores information used to identify and authenticate an IoT device?

Narrowband IoT

Subscriber identity module

Zigbee

Cellular IoT baseband

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which type of RFID attack can unauthorized users listen to communications between RFID tags and readers?

Eavesdropping

Data theft

Unauthorized tag access

Fake tags

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of wireless attack is designed to capture wireless transmissions coming from legitimate users?

Evil twin

Wireless denial of service attacks

Rogue access point

Jamming

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which type of attack can give an attacker access to a device and allow them to copy personal information using an unauthorized radio frequency connection?

Bluesnarfing

NFC attack

Bluejacking

RFID attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which wireless probe can be designed by configuring a laptop computer to scan and record wireless signals within its range at regular intervals and report the information to a centralized database?

Dedicated probes

Wireless device probe

Access point probe

Desktop probe

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why are jamming attacks generally rare?

The transmitter is not very powerful and must be close to the target

They can't get around new IEEE amendments that fully protect WLANs

They require expensive, sophisticated equipment

They can't identify WLAN RF signals from other device signals

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?