Wi-Fi MCQs

Wi-Fi MCQs

These Wi-Fi multiple-choice questions and their answers will help you strengthen your grip on the subject of Wi-Fi. You can prepare for an upcoming exam or job interview with these 100+ Wi-Fi MCQs.
So scroll down and start answering.

1: The most common way to secure a wireless connection is to use:

A.   SEP

B.   WEP

C.   KEP

D.   AEP

2: IEEE 802.11af allows WLAN operation within what two ITU-designated radio wave frequency ranges?

A.   ULF and VLF

B.   LF and MF

C.   ELF and SLF

D.   VHF and UHF

3: In many cases municipal wifi networks are being created with a combination of:

A.   muniwif and muniwifi

B.   largewifi and smallwifi

C.   muniwifi and wifi

D.   wimax and wifi

4: Wifi works on radio band:

A.   802.09

B.   802.15

C.   802.11

D.   802.13

5: What does the W in WLAN stand for?

A.   web

B.   wide

C.   world

D.   wireless

6: Which of the following may cause transmission interference with a wireless sign?

A.   (all of these)

B.   buildings

C.   mountains

D.   trees

7: Which of the following devices would definitely not use WiFi?

A.   laptop computer

B.   tablet computer

C.   (none of these)

D.   smartphone

8: Which frequencies does Wifi use to transmit data?

A.   audio

B.   light

C.   sound

D.   radio

9: What does the term WLAN refer to?

A.   Wireless Local Area Network

B.   Wireless Language

C.   Wireless Length Amplitude

D.   Wireless Logical Analog Node

10: True or False? The more users that share an access point, the slower a wireless network can become.

A.   False

B.   True

11: A specific location in which an end user can access the Internet wirelessly:

A.   internet point

B.   access point

C.   oval point

D.   entry point

12: Wifi is used to connect devices to:

A.   Ipad

B.   Internet

C.   PDS

D.   DEsktop

13: What is the term assocaited with DHCP that allows your computer to acces other computers outside your network?

A.   SOCKS

B.   Gateway

C.   Gatekeeper

D.   Tunnel

14: What does AP stand for?

A.   amplified power

B.   access point

C.   augmented primer

D.   authorization port

15: By using this type of wireless connection, you computer is secure from prying eyes:

A.   MIMO

B.   AIO

C.   Encrypted

D.   Air Gap

16: Which of the following can redirect an Internet signal to multiple end users?

A.   printer

B.   scanner

C.   transmitter

D.   router

17: When you connect to a wireless network, you are assigned an IP address. What is an IP address?

A.   Internet Protocol address used to identify computers on the network

B.   Integrated Protocol addresses used to share data with mobile phones

C.   Integrated Programming addresses used to share data with mobile phones

D.   Instant Protocol Address used to surf the internet

18: WPA2 increased the security of WPA from 128 bits to how many bits?

A.   256 bits

B.   160 bits

C.   620 bits

D.   432 bits

19: Wifi was built to move:

A.   video

B.   audio

C.   data traffic

D.   air traffic

20: True or false? Wimax offers larger coverage areas with greater bandwidth and speeds compared to wifi.

A.   True

B.   False

21: The Wired Equivalent Privacy (WEP) security algorithm was first introduced in 1997 by what professional association?

A.   CASE

B.   GMEA

C.   IEEE

D.   AAR

22: An IPaddress gets assigned to a computer by a wireless router. what performs this?

A.   BGP

B.   IPAU

C.   LDAP

D.   DHCP

23: What is the most basic difference between a WLAN and an Ethernet LAN?

A.   A WLAN is automatically encrypted while a Ethernet LAN is not.

B.   A WLAN uses licensed frequencies while a Ethernet LAN uses unlicensed frequencies.

C.   A WLAN uses radio waves, while a Ethernet LAN uses some form of cable.

D.   A WLAN does not use security protocols while a Ethernet LAN does.

24: The radio waves of a WLAN are generated by which device?

A.   updated drivers

B.   hard drive

C.   router

D.   modem

25: Which of the following ISM bands is likely to be the most heavily populated?

A.   6.765 MHz

B.   2.4 GHz

C.   544 GHz

D.   1.74 MHz

26: When trying to connect to a wireless network, at times it's name is hidden. What is the technical term for this wireless name?

A.   WNAM

B.   Annonymous

C.   SSID

D.   LNAM

27: The wavelength of an electromagnetic signal is inversely proportional to what other feature of that signal?

A.   the signal's power in mW

B.   the power of the signal's source in mW

C.   the signal's resistance in ohms

D.   the signal's frequency

28: Which of the following allows your computer to send and receive wireless signals to and from the internet?

A.   wireless network interface card

B.   all access network interface card

C.   wide area network interface card

D.   local area network interface card

29: What does DNS stand for?

A.   Deterministic Network System

B.   Dynamic Naming Server

C.   Dynamic Network System

D.   Domain Name System

30: Which one is the most secure?

A.   WPA4

B.   WEP

C.   WPA

D.   WPA2

31: Some wireless routers provide QoS to help prioritize traffic. What does QoS stand for?

A.   Quality of Schematic

B.   Quotient of Service

C.   Quality of Service

D.   Quotient of System

32: WPA stands for:

A.   Wifi Public Access

B.   Wifi Private Access

C.   Wifi Packet Access

D.   Wifi Protected Access

33: The diameter of a hotspot area is about:

A.   800-1000 feet

B.   600-1000 feet

C.   100-500 feet

D.   600-700 feet

34: What do you call the name of a network that is broadcast by a router?

A.   EPP (encryption protocol point)

B.   WEP (wireless entry point)

C.   BUHT (broadcast unit hub tag)

D.   SSID (service set identifier)

35: Wireless networks can operate on one of which two modes?

A.   oblique mode or nominal mode

B.   ad hoc mode or infrastructure mode

C.   generative mode or non-generative mode

D.   basic mode or multiple-source mode

36: Wireless keys are:

A.   binary numbers

B.   decimal numbers

C.   octal numbers

D.   hexadecimal numbers

37: Which of the following can be effectively used to restrict unnecessary traffic on your wireless network?

A.   Encryption

B.   Firewall

C.   MAC Address

D.   Network Interface

38: What is the unique identifier tied to your wireless or wired ethernet card called?

A.   Media Access Client

B.   Media Access Control

C.   Multiple Address Client

D.   Menu Access Client

39: Which of the following is not one of the layers of the OSI networking model?

A.   Layer 1 - Physical

B.   Layer 5 - Security

C.   Layer 2 - Data

D.   Layer 3 - Network

40: Antenna gain is characterized by what unit of measurement?

A.   dBi or dBd

B.   mW or W

C.   dM or pM

D.   Hz or GHz

41: The strength of a Wi-Fi wireless radio signal is measured using what standard unit?

A.   decibels (dB)

B.   milliwatts (mW)

C.   hertz (Hz)

D.   ohms

42: Of the following choices, which 802.11 offers the highest potential speeds?

A.   802.11n

B.   802.11b

C.   802.11g

D.   802.11a

43: IEEE 802.11i is also referred to as:

A.   WPA2

B.   WEP

C.   WEP2

D.   WPA

44: What do the letters DSSS stand for?

A.   Direct-Service System Standards

B.   Direct-Sequence Spread Spectrum

C.   Direct-Solution Software System

D.   Direct-System Server Software

45: IEEE 802.1X security protocol uses which three components?

A.   petitioner, barrier, gate

B.   supplicant, authenticator, authentication server

C.   mark, monitor, master key

D.   client, password, verifying software

46: If a device that is rated at 40 milliwatts (mW) is added to a connector whose resistance reduces the power by 3 decibels (-3dB), what is most likely to be the device's power rating?

A.   100 milliwatts (mW)

B.   -50 milliwatts (mW)

C.   6.6 milliwatts (mW)

D.   20 milliwatts (mW)

47: IEEE 802.11 wireless LAN use a media access control protocol called:

A.   Carrier Sense Multiple Access

B.   Carrier Sense Single Access with Collision Detection

C.   Carrier Sense Multiple Access without Collision Detection

D.   Carrier Sense Multiple Access with Collision Detection

48: One technique used in attempts to crack a cipher or authentification mechanism is to try hundreds, maybe millions of possible passwords or phrases. What is this technique called?

A.   a "Fibonacci sequence"

B.   a "systematic barage"

C.   a "highjack"

D.   a "dictionary attack"

49: A decibel (dB) is a ratio determined by what two power quantities?

A.   energy and valence

B.   signal and noise

C.   amplitude and phase shift

D.   wavelength and frequency

50: Which of the following security systems was marked as "deprecated," and therefore a security risk, in 2004?

A.   WEP

B.   WPA

C.   TKIP

D.   EAP