CS/IT MCQs

Top 20 Multiple-Choice Questions on Wireless LAN

Google+ Pinterest LinkedIn Tumblr
Here are the collections of multiple-choice questions on wireless LAN includes objective type questions on the fundamentals of Wireless LAN technology. It includes MCQ questions on the advantages and disadvantages of Wireless LAN, different types of wireless LAN, Ad hoc verses infrastructure mode, IEEE 802.11 architecture and services, the physical layer of the IEEE 802.11, and Wireless LAN security.

Read Next: 20 MCQ Questions on Fundamentals of GPRS and WAP

1) Which of the following is/are the advantages of wireless LANs.
i. Installation speed and simplicity
ii. Installation flexibility
iii. Scalability
A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii and iii

2) Which of the following is/are the disadvantages of wireless LANs.
i. Noise and interference
ii. Lower reliability
iii. Fluctuation
A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii and iii

3) Which of the following is/are the types of LAN.
i. Super LAN
ii. Home RF
iii. Bluetooth
iv. MANET
A. i, ii and iii only
B. ii, iii and iv only
C. i, iii and iv only
D. All i, ii, iii and iv

4) State whether the following statements about the Ad hoc mode are True or False.
i. In Ad hoc mode, there is an access point or infrastructure.
ii. Ad hoc networks only require 802.11 client radios in the client devices that connect to the network.
A. i-True, ii-False
B. i-False, ii-True
C. i-True, ii-True
D. i-False, ii-False

5) State whether the following statements about the infrastructure mode are True or False.
i. In infrastructure mode, MS is connected to a base station or access point.
ii. Infrastructure network is similar to a star network where all the mobile stations are attached to the base station.
A. i-True, ii-False
B. i-False, ii-True
C. i-True, ii-True
D. i-False, ii-False

6) Which of the following is/are the functions of the physical layer of the IEEE 802 reference model.
i. Encoding and decoding of the signals.
ii. Preamble generation.
iii. Bit transmission and reception
A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii and iii

7) The … in a wireless LAN consists of some number of stations executing the same MAC protocol and competing for access to the same shared wireless medium.
A. Basic Service Set(BSS)
B. Extended Service Set(ESS)
C. Distributed System(DS)
D. Access Point(AP)

8) State whether the following statements about the basic service set(BSS) are True or False.
i. A BSS may connect to a backbone distribution system(DS) through an access point(AP).
ii. In BSS, client stations communicate directly with one another.
A. i-True, ii-False
B. i-False, ii-True
C. i-True, ii-True
D. i-False, ii-False

9) An … consists of two or more basic service sets interconnected by a distribution system.
A. Basic Service Set(BSS)
B. Extended Service Set(ESS)
C. Distributed System(DS)
D. Access Point(AP)

10) IEEE 802.11 defines … services that need to be provided by the wireless LAN to provide functionality equivalent to that which is inherent to wired LANs.
A. seven
B. eight
C. nine
D. ten

11) Which of the following is/are the services provided by the wireless LAN defined by IEEE 802.11?
i. Association
ii. Integration
iii. Distribution
iv. Privacy
A. i, ii and iii only
B. ii, iii and iv only
C. i, iii and iv only
D. All i, ii, iii and iv

12) … are the transaction types defined by IEEE 802.11 standard based on mobility.
i. No transition
ii. Full transaction
iii. BSS transition
iv. ESS transition
A. i, ii and iii only
B. ii, iii and iv only
C. i, iii and iv only
D. All i, ii, iii and iv

13) State whether the following statements about the services need to be provided by the wireless LAN is True or False.
i. A station should give disassociation notification before leaving an ESS or shutting down.
ii. A station must establish an association with an AP within a particular BSS.
A. i-True, ii-False
B. i-False, ii-True
C. i-True, ii-True
D. i-False, ii-False

14) The … service is used by the stations to establish their identity with stations they wish to communicate with IEEE 802.11.
A. Authentication
B. Association
C. De-authentication
D. Privacy

15) … is invoked whenever an existing authentication is to be terminated.
A. Authentication
B. Association
C. De-authentication
D. Privacy

16) … is used to prevent the contents of messages from being read by other than the intended recipient.
A. Authentication
B. Association
C. De-authentication
D. Privacy

17) The IEEE 802.11 MAC layer covers which of the following functions areas.
i. reliable data delivery
ii. medium access control
iii. security
A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii and iii

18) State whether the following statements about the IEEE 802.11 physical layer is True or False.
i. IEEE802.11a operates in the 5-GHz band at data rates up to 54 Mbps.
ii. IEEE 802.11b operates in the 5-GHz band at 5.5 and 11 Mbps.
A. i-True, ii-False
B. i-False, ii-True
C. i-True, ii-True
D. i-False, ii-False

19) The 802.11i architecture consists of which of the following ingredients.
i. Authentication
ii. Access control
iii. Privacy with message integrity
iv. Privacy without message integrity
A. i, ii and iii only
B. ii, iii and iv only
C. i, iii and iv only
D. All i, ii, iii and iv

20) IEEE 802.11 includes which of the following features.
i. Open system and shared authentication modes
ii. Service set identifiers – SSID
iii. Wired Equipment Privacy – WEP
A. i and ii only
B. ii and iii only
C. i and iii only
D. All i, ii and iii

Answers:

  1. D. All i, ii and iii
  2. D. All i, ii and iii
  3. B. ii, iii and iv only
  4. B. i-False, ii-True
  5. C. i-True, ii-True
  6. D. All i, ii and iii
  7. A. Basic Service Set(BSS)
  8. A. i-True, ii-False
  9. B. Extended Service Set(ESS)
  10. C. nine
  11. D. All i, ii, iii and iv
  12. C. i, iii and iv only
  13. C. i-True, ii-True
  14. A. Authentication
  15. C. De-authentication
  16. D. Privacy
  17. D. All i, ii and iii
  18. A. i-True, ii-False
  19. A. i, ii and iii only
  20. D. All i, ii and iii

Shuseel Baral is a web programmer and the founder of InfoTechSite has over 8 years of experience in software development, internet, SEO, blogging and marketing digital products and services is passionate about exceeding your expectations.

Write A Comment