
WLAN
Quiz by Dayang Azra binti Awang Mat
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1In CSMA/CD, if media is sensed idle...................., if busy .......................transmit and waitstop and retransmitretransmit and waitwait and transmit60s
- Q2What is this infrastructure called?infrastructure modeAd-hoc modeclient modeWLAN mode60s
- Q3The most popular 802.11 standard currently in deployment. Supports 1, 2, 5.5 and 11 Mbps data rates in the 2.4 GHz ISM (Industrial-Scientific-Medical) band (This statement refer to...?)WLAN 802.11gWLAN 802.11eWLAN 802.11bWLAN 802.11a60s
- Q4In MACA, which statement is NOT true?receiver send ACKreceiver respond with a CTS frameWhen sender does not get a CTS back, it assumes successful transmitted.sender send a request containing length of the transmission60s
- Q5In this mode the clients communicate via a central station called Access Point (AP) which acts as an ethernet bridge and forwards the communication onto the appropriate network, either the wired or the wireless network. WHAT IS THIS MODE?all is not trueInfrastructure modeaccess modead hoc mode60s
- Q6A simple code that identifies the WLAN. THIS REFER TO?WLANwired equivalent privacy (WEP)media access control (MAC)Service set identifier (SSID)60s
- Q7MAC adress filtering, what is NOT the disadvantage?Reduces ScalabilityProvides a little stronger security than SSIDDetermined hackers can still break itIncreases Administrative overhead60s
- Q8WEP had three main security goals exceptConfidentiality: Prevent eavesdroppingData Integrity: Ensure that messages are not altered or tampered with in transitAccess Control: Prevent inappropriate use of 802.11 network, such as facilitate dropping of not-authorized packetsIncreases Administrative overhead60s
- Q9What is NOT true about RSN?stands for Robust Security Networkdoes not have AES encryptionuses dynamic negotiationAES encryption60s
- Q10All are security standards except802.11i (2003-4)802.11i (2006-8)WPA (Wi-Fi Protected Access) (2002)802.1x Authentication (2001)60s