Sie sind auf Seite 1von 2

Computer Networks Questions & Answers � Wireless LAN

This set of Computer Networks Multiple Choice Questions & Answers (MCQs) focuses on
�Wireless LAN�.

1. What is the access point (AP) in a wireless LAN?


a) device that allows wireless devices to connect to a wired network
b) wireless devices itself
c) both device that allows wireless devices to connect to a wired network and
wireless devices itself
d) all the nodes in the network
View Answer

Answer: a
Explanation: Access point in a wireless network is any device that will allow the
wireless devices to a wired network. A router is the best example of an Access
Point.
2. In wireless ad-hoc network _________
a) access point is not required
b) access point is must
c) nodes are not required
d) all nodes are access points
View Answer

Answer: a
Explanation: An ad-hoc wireless network is a decentralized kind of a wireless
network. An access point is usually a central device and it would go against the
rules of the ad-hoc network to use one. Hence it is not required.
3. Which multiple access technique is used by IEEE 802.11 standard for wireless
LAN?
a) CDMA
b) CSMA/CA
c) ALOHA
d) CSMA/CD
View Answer

Answer: b
Explanation: CSMA/CA stands for Carrier-sense multiple access/collision avoidance.
It is a multiple access protocol used by IEEE 802.11 standard for wireless LAN.
It�s based on the principle of collision avoidance by using different algorithms to
avoid collisions between channels.
4. In wireless distribution system __________
a) multiple access point are inter-connected with each other
b) there is no access point
c) only one access point exists
d) access points are not required
View Answer

Answer: a
Explanation: A Wireless Distribution System allows the connection of multiple
access points together. It is used to expand a wireless network to a larger
network.
5. A wireless network interface controller can work in _______
a) infrastructure mode
b) ad-hoc mode
c) both infrastructure mode and ad-hoc mode
d) WDS mode
View Answer

Answer: c
Explanation: A wireless network interface controller works on the physical layer
and the data link layer of the OSI model. Infrastructure mode WNIC needs access
point but in ad-hoc mode access point is not required.
6. In wireless network an extended service set is a set of ________
a) connected basic service sets
b) all stations
c) all access points
d) connected access points
View Answer

Answer: a
Explanation: The extended service set is a part of the IEEE 802.11 WLAN
architecture and is used to expand the range of the basic service set by allowing
connection of multiple basic service sets.
7. Mostly ________ is used in wireless LAN.
a) time division multiplexing
b) orthogonal frequency division multiplexing
c) space division multiplexing
d) channel division multiplexing
View Answer

Answer: b
Explanation: In orthogonal frequency division multiplexing, digital data is encoded
on multiple carrier frequencies. It is also used in digital television and audio
broadcasting in addition to Wireless LANs.
8. Which one of the following event is not possible in wireless LAN?
a) collision detection
b) acknowledgement of data frames
c) multi-mode data transmission
d) connection to wired networks
View Answer

Answer: a
Explanation: Collision detection is not possible in wireless LAN with no
extensions. Collision detection techniques for multiple access like CSMA/CD are
used to detect collisions in Wireless LANs.
9. What is Wired Equivalent Privacy (WEP)?
a) security algorithm for ethernet
b) security algorithm for wireless networks
c) security algorithm for usb communication
d) security algorithm for emails
View Answer

Answer: b
Explanation: WEP is a security algorithm for wireless network which intended to
provide data confidentiality comparable to that of traditional wired networks. It
was introduced in 1997.
10. What is WPA?
a) wi-fi protected access
b) wired protected access
c) wired process access
d) wi-fi process access
View Answer

Answer: a
Explanation: WPA or WiFi Protected Access is a security protocol used to provide
users and firms with strong data security and protection for their wireless
networks (WiFi) to give them confidence that only authorized users can access their
network.

Das könnte Ihnen auch gefallen