You are on page 1of 6

1. IEEE 802.

11 wireless network consist of four major physical components EXCEPT


a)
b)
c)
d)

Mobile Stations
Wireless Medium
Distribution Systems
Wired Medium

2. Which of the following features IEEE 802.11a and 802.11g wireless standards share
in common?
a)
b)
c)
d)

Both operate at 5Ghz frequency spectrum range


Both standards were developed in 2000
Both supports transmission speeds of up to 54Mbps
Both are publicly accessible through hotspots

3. Which of the following statements correctly describe the advantages of faster


improved encoding methods in 802.11 wireless networks EXCEPT
a) The encoding on the link increase more data in per unit of time
b) Receivers require greater signal-to-noise ratios in order to receive subtle signal
changes
c) Faster coding methods increase the speed of data transfer
d) Receivers must change its operating radio channel to higher channel numbers
4. Which of the following statements concerning ESS wireless transitions are correct
EXCEPT?
a) An ESS transition refers to the movement from one BSS to a second distinct ESS
b) Higher-layer connections are almost guaranteed to be interrupted
c) Seamless transitions from the left hand ESS to the right hand ESS are not
supported
d) Maintaining higher-level connections requires support from the protocol suites
involved in transitions
5. Which of the following components are commonly used to implement the distribution
system also known as backbone network in wireless LANs?
a) Proxy server and wireless gateway
b) Transmission medium and wireless repeaters
c) Bridging engine and transmission medium
d) Wireless bridge and network adapters
6. Following statements are true for Rogue Access Point EXCEPT?
a) Wi-Fi access point installed on a network but is not authorized for operation on
that network
b) Rogue AP is under the management of the network administrator

c) Rogue AP often do not conform to wireless LAN (WLAN) security policies


d) Rogue AP can allow anyone with a Wi-Fi device to connect to your network
7. The process of encryption for stream ciphers and block ciphers are known as
-------------- encryption mode?
a)
b)
c)
d)

Wired Equivalent Privacy (WEP)


Electronic Code Book (ECB)
Stream cipher
Block cipher

8. Following statements are True for Initialization Vector (IV) used in WEP security for
IEEE802.11 networks EXCEPT?
a)
b)
c)
d)
e)

Dynamic 24-bit value


Chosen randomly by the transmitter wireless network interface
Static 36 bit value
16.7 million possible keys (224)

9. Which of the following devices operate under Industrial Scientific and Medical (ISM)
band EXCEPT?
a)
b)
c)
d)

Ultrasonic Devices
FHSS LAN transceivers
Cordless phones
AM/FM radio tuners

10. Which of the following statements are true for Bluetooth EXCEPT?
a)
b)
c)
d)

It is a radio based communication technology operates under the ISM band


It operates at 5 GHz, which is available license free globally
Intended as a replacement for cables
It has low power usage and cheap to build and install

11. In comparison to IEEE 802.11 LANs, HiperLAN2 offers more features, which are
following EXCEPT?
a)
b)
c)
d)

High-throughput transmission
Connection less communication networks
Dynamic frequency selection
Application and network independence

12. Which of the following types of wireless network attack can be classified as a passive
attack?
a) Masquerading

b) Flooding
c) Snooping
d) Man in the middle attack
13. In the piconet configuration of Bluetooth technology, which of the following devices
cannot actively participate but are known and can be reactivated within milliseconds?
a)
b)
c)
d)

Slave devices
Master Devices
Stand-by devices
Parked devices

14. Which of the following activities is not part of the radio frequency management for
wireless LANs?
a)
b)
c)
d)

Channel allocation
Frequency protection
Interference detection
Transmit power

15. Which of the following statements are true for Packet Switched Cellular networks
EXCEPT?
a) Serve a wide range of services including voice, data, e-mail, and digital video
b) It supports large population of infrequent users for economic viability
c) It centralizes the network control among interference units thus provides the
capability to support low dense user environments
d) The relatively unreliable cellular channel is more suited for packet switching
16. Which of the following subsystems belongs to the GSM system architecture
EXCEPT?
a)
b)
c)
d)

Mobile Station Subsystem


Base Station Subsystem
Network Switching Subsystem
Security Protocols Subsystem

17. Which of the following statement is true about HSCSD?


a) HSCSD is a Packet switched technique that allows a single mobile subscriber to
use only one time slot in the GSM standard
b) HSCSD is a circuit switched technique that allows a single mobile subscriber to
use consecutive user time slots in the GSM standard
c) HSCSD relaxes the error control coding algorithms originally specified in the
AMPS standard for data transmissions
d) It is a common standard to take advantage of unused bandwidth in the cellular air
link

18. Which of the following standard is not an example of wireless Wide Area Network?
a)
b)
c)
d)

Wireless Fidelity
Broadband fixed wireless access (BFWA)
Wireless Broadband (WiBro)
IEEE 802.16 (WiMAX)

19. Which of the following statements concerning the uplink and downlink of satellite
transmissions is not true?
a) The uplink describes the signal that travels from the ground transmitter up to the
satellite receiver.
b) The Federal Communications Commission (FCC) in the United States allocates
the uplink and downlink frequency bands for satellite systems.
c) Satellite communications uplink frequency band and the downlink frequency
band (in a given system) are always the same.
d) The responsibility for allocating "International" frequencies falls under the
International Telecommunications Union (ITU).
20. Which of the following statements is true for frequency division multiple access
(FDMA)?
a) Frequency division multiple access (FDMA) assigns individual channels to
individual users
b) The bandwidths of FDMA channels are relatively narrow (30 kHz in AMPS) as
each channel supports only one circuit per carrier
c) The complexity of FDMA mobile systems is higher compared to TDMA systems
d) Since FDMA is a continuous transmission scheme, fewer bits are needed for
overhead purposes (such as synchronization and framing bits) as compared to
TDMA

Question B1
a) Despite the fact that WEP algorithm can be easily cracked, it is still a popular choice in
providing data privacy. Describe the working of WEP using a suitable scenario with
substantial justifications. Also explain five (5) drawbacks of WEP algorithm with
suitable examples?
(10 marks)
b) Explain the process of 802.11i security protocol for providing extensive security across
wireless networks? Also critically evaluate how its more secure then WEP.
(8 marks)
c) Describe the elements of network management system? Explain the steps how a
system is managed using suitable example. Also explain the purpose of (FCAPS)
model with desirable results
(12 marks)
Question B2
a) Explain Bluetooth technology with its uses? Describe the functionality of Piconet and
Scatternet. Also describe the categories of nodes in Piconets?
(10 marks)
b) Explain the four-step security mechanism used in Bluetooth to securely transfer data
between devices?
(8 marks)
c) Describe the sub systems of GSM architecture? Also describe the implementation of
the Time Division Multiple Access (TDMA) technique in terms of the process
involved.
(12 marks)
Question B3
a) Differentiate between HSCSD and CDPD techniques by evaluating them in terms of
cellular networks? Also describe the requirements established by the Wireless
Application Protocol (WAP) forum for solutions developed for wireless applications
and devices.
(10 marks)
b) Explain the working of WIMAX technology across MAN? State and describe the types
of quality of service guarantees supported by the Worldwide Interoperability for
Microwave Access (WiMAX) technology.
(12 marks)
c) Discuss how the geosynchronous orbit works to allow satellites to appear to remain
stationary while rotating around the earth on the equator.
(8 marks)

You might also like