Exam 5: Wireless Personal Area Networks
Exam 1: Introduction to Wireless Communications50 Questions
Exam 2: Wireless Data Transmission50 Questions
Exam 3: Radio Frequency Communications50 Questions
Exam 4: How Antennas Work50 Questions
Exam 5: Wireless Personal Area Networks49 Questions
Exam 6: High-Rate Wireless Personal Area Networks50 Questions
Exam 7: Low-Speed Wireless Local Area Networks50 Questions
Exam 8: High-Speed Wlans and Wlan Security49 Questions
Exam 9: Wireless Metropolitan Area Networks50 Questions
Exam 10: Wireless Wide Area Networks48 Questions
Exam 11: Radio Frequency Identification and Near-Field Communication50 Questions
Exam 12: Wireless Communications in Business50 Questions
Select questions type
Which of the following is true about the ZigBee standard?
Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
A
Which of the following is true about the OSI model and IEEE 802?
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
What is the process that ZigBee WPANs use for authentication and encryption? Describe how it works.
Free
(Essay)
4.8/5
(43)
Correct Answer:
ZigBee WPANs use a process called symmetric key for both authentication and encryption. A symmetric key is a sequence of numbers and letters, much like a password, that must be entered by the authorized user on all devices. No automatic key distribution or key rotation is included in the standard, although these options can be implemented at the higher protocol layers. The length of the key can be 4, 6, 8, 12, 14, or 16 octets, with longer keys providing more security than shorter ones.
MATCHING
-a simple method of phase shift keying that uses eight degrees of phase to encode tribits
(Multiple Choice)
4.9/5
(32)
MATCHING
-a security service available in 802.15.4 and used by the receiving device
(Multiple Choice)
4.9/5
(34)
In a ZigBee tree topology, if a child loses it connection with its FFD, it becomes a(n) _____________.
(Short Answer)
4.8/5
(32)
MATCHING
-a code composed of a subset of the data, the length of the data, and the symmetric key
(Multiple Choice)
4.8/5
(39)
Which feature of Bluetooth version 1.2 allows Bluetooth networks to coexist with 802.11 networks with a minimum of interference?
(Multiple Choice)
4.8/5
(37)
What feature of Bluetooth version 3.0 uses a separate radio module that transmits using the same methods as IEEE 802.11?
(Multiple Choice)
4.8/5
(39)
Which type of ZigBee device controls the network in a star topology?
(Multiple Choice)
4.8/5
(44)
List three of the seven tasks the 802.15.4 MAC layer is responsible for.
(Essay)
4.7/5
(39)
MATCHING
-a packet-switched link that is used for data transmissions
(Multiple Choice)
4.8/5
(24)
What is created when a Bluetooth network has one master and at least one slave using the same channel?
(Multiple Choice)
4.8/5
(29)
Which Bluetooth power class allows transmission ranges up to 330 feet?
(Multiple Choice)
4.9/5
(25)
MATCHING
-a process that enables a device to discover which devices are in range
(Multiple Choice)
4.7/5
(42)
In Bluetooth Encryption Mode ______, all traffic is encrypted.
(Short Answer)
4.8/5
(41)
What is a cluster tree topology and how do they compare to mesh networks?
(Essay)
4.9/5
(43)
Showing 1 - 20 of 49
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)