Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1
    In CSMA/CD, if media is sensed idle...................., if busy .......................
    transmit and wait
    stop and retransmit
    retransmit and wait
    wait and transmit
    60s
  • Q2
    What is this infrastructure called?
    Question Image
    infrastructure mode
    Ad-hoc mode
    client mode
    WLAN mode
    60s
  • Q3
    The most popular 802.11 standard currently in deployment. Supports 1, 2, 5.5 and 11 Mbps data rates in the 2.4 GHz ISM (Industrial-Scientific-Medical) band (This statement refer to...?)
    WLAN 802.11g
    WLAN 802.11e
    WLAN 802.11b
    WLAN 802.11a
    60s
  • Q4
    In MACA, which statement is NOT true?
    receiver send ACK
    receiver respond with a CTS frame
    When sender does not get a CTS back, it assumes successful transmitted.
    sender send a request containing length of the transmission
    60s
  • Q5
    In this mode the clients communicate via a central station called Access Point (AP) which acts as an ethernet bridge and forwards the communication onto the appropriate network, either the wired or the wireless network. WHAT IS THIS MODE?
    all is not true
    Infrastructure mode
    access mode
    ad hoc mode
    60s
  • Q6
    A simple code that identifies the WLAN. THIS REFER TO?
    WLAN
    wired equivalent privacy (WEP)
    media access control (MAC)
    Service set identifier (SSID)
    60s
  • Q7
    MAC adress filtering, what is NOT the disadvantage?
    Reduces Scalability
    Provides a little stronger security than SSID
    Determined hackers can still break it
    Increases Administrative overhead
    60s
  • Q8
    WEP had three main security goals except
    Confidentiality: Prevent eavesdropping
    Data Integrity: Ensure that messages are not altered or tampered with in transit
    Access Control: Prevent inappropriate use of 802.11 network, such as facilitate dropping of not-authorized packets
    Increases Administrative overhead
    60s
  • Q9
    What is NOT true about RSN?
    stands for Robust Security Network
    does not have AES encryption
    uses dynamic negotiation
    AES encryption
    60s
  • Q10
    All are security standards except
    802.11i (2003-4)
    802.11i (2006-8)
    WPA (Wi-Fi Protected Access) (2002)
    802.1x Authentication (2001)
    60s

Teachers give this quiz to your class