WiMAX MCQs

WiMAX MCQs

These WiMAX multiple-choice questions and their answers will help you strengthen your grip on the subject of WiMAX. You can prepare for an upcoming exam or job interview with these 50 WiMAX MCQs.
So scroll down and start answering.

1: What is the full form of MPDU?

A.   Microwave Protected Data Unit

B.   Multi-access Protected Data Unit

C.   MAC Protocol Data Unit

D.   Media Protocol Data Unit

2: Which of the following are included in each data SA (Security Association)?

A.   Two traffic encryption keys (TEKs)

B.   TEK lifetime

C.   Data SA type indicator

D.   An authorization key (AK)

E.   A key encryption key (KEK)

A.   TDMA

B.   TDM

C.   TDD

D.   FDD

A.   Basic connection

B.   Primary management connection

C.   Secondary management connection

D.   Any of the above

5: What is the maximum number of management connection pairs that can be created when a subscriber station (SS) first connects to a base station (BS)?

A.   One

B.   Two

C.   Three

D.   Four

6: Which of the following FFT (Fast Fourier Transform) sizes are supported in SOFDMA (Scalable OFDMA)?

A.   128

B.   256

C.   512

D.   1024

E.   2048

7: Which version of X.509 certificate is mandatory to be used in the 802.16 standard?

A.   Version 1

B.   Version 2

C.   Version 3

D.   Any of the above

8: What can be the maximum value of the traffic encryption key (TEK) lifetime?

A.   30 minutes

B.   Half day

C.   Seven days

D.   Seventy days

9: In which of the following topology modes can the 802.16 standard be used?

A.   Point-to-Point

B.   Point-to-Multipoint

C.   Mesh

D.   All of the above

10: Which of the following are managed by the physical layer of the protocol stack in WiMAX?

A.   Error Correction

B.   Security

C.   Connections

D.   Bandwidth Request

11: In the subheader of a MAC frame, what will be the value of FC (fragment control) bits if it is the last fragment of the MSDU?

A.   00

B.   01

C.   10

D.   11

12: What is the length (size) of a connection identifier (CID)?

A.   4 bits

B.   8 bits

C.   16 bits

D.   32 bits

13: On which of the following frequency ranges does the first WiMAX standard (IEEE 802.16-2001) operate?

A.   2-11 GHz

B.   5-6 Ghz

C.   10-66 GHz

D.   2-6 GHz

14: In OFDM the original signal is divided into how many subcarriers or subchannels?

A.   64

B.   128

C.   256

D.   512

15: How many hash-based message authentication code (HMAC) keys are derived from the authorization key (AK) for communication between the subscriber station (SS) and the base station (BS)?

A.   One

B.   Two

C.   Four

D.   None of the above

16: Which of the following encryption algorithms are included in the 802.16 standard security sublayer?

A.   Data Encryption Standard (DES)

B.   Advanced Encryption Standard (AES)

C.   Rivest Shamir Adleman (RSA)

D.   None of the above

17: Which of the following connections is used for short, time-urgent MAC management messages?

A.   Basic connection

B.   Primary management connection

C.   Secondary management connection

D.   Any of the above

18: Which of the following multiplexing technologies is more spectrum-efficient and cost-efficient?

A.   Frequency Division Multiplexing (FDM)

B.   Orthogonal Frequency Division Multiplexing (OFDM)

19:

State whether true or false:

The MAC layer of WiMAX does not allow variable-sized frames to be constructed and transmitted.

A.  

True

B.  

False 

20:

State whether true or false:

In OFDMA, multiple users can transmit data simultaneously.

A.  

True 

B.  

False

21: Which of the following multiplexing technologies are used in 802.16?

A.   FDD

B.   TDMA

C.   TDD

D.   TDM

22: Which of the following are included in each authorization SA (Security Association)?

A.   Downlink hash-based message authentication code (DHMAC)

B.   Uplink hash-based message authentication code (UHMAC)

C.   Type of data SA

D.   An authorization key (AK)

E.   A key encryption key (KEK)

F.   All of the above

23:

State whether true or false:

Communication in WiMAX is connection-oriented.

A.  

True 

B.  

False

24: Which of the following are the different types of data SAs (Security Associations)?

A.   Primary

B.   Secondary

C.   Static

D.   Dynamic

A.   2

B.   3

C.   4

D.   8

26: Which of the following are the new power management operations defined in 802.16e?

A.   Active mode

B.   Idle mode

C.   Sleep mode

D.   All of the above

A.   Convergence Sublayer (CS)

B.   Commom Part Sublayer (CPS)

C.   Security Sublayer (SS)

D.   None of the above

28: Which of the following are the two types of soft handovers defined in 802.16e?

A.   Fast BS Switching

B.   Secure BS Switching

C.   Micro Diversity HandOver

D.   Macro Diversity HandOver

29: Which of the following modulation technologies is/are supported by 802.16a?

A.   QPSK

B.   16QAM

C.   64QAM

D.   All of the above

30: How many types of security associations (SA) are defined in PKMv2 in the 802.16 standard?

A.   One

B.   Two

C.   Three

D.   Four

31: What is the other name for WiMAX?

A.   WLAN

B.   WMAN

C.   Wi-Fi

D.   WAN

32:

State whether true or false:

In PKMv2, only the BS can authenticate the SS.

A.  

True

B.  

False 

33: In VOIP, change in payload and code sizes of MPDUs sent by SS depends on which of the following?

A.   Feedback sent by the SS

B.   Feedback received from the BS

C.   Nether of the two

34: Which of the following duplexing technologies does 802.16 support?

A.   FDD

B.   TDMA

C.   TDD

D.   TDM

35: Which of the following certificates is used to allow the base station to identify the subscriber stations?

A.   X.905

B.   X.509

C.   X.801

D.   X.816

36: What is the length (size) of the key encryption (in bits) that the DES (data encryption standard) provides?

A.   32 bit

B.   56 bit

C.   64 bit

D.   128 bit

37: What is the length (in bits) of the header check sequence (HCS) field in a generic MAC header?

A.   2

B.   4

C.   8

D.   16

38: In the mobile WiMAX profiles, which of the following is mandatory?

A.   Hard handover

B.   Soft handover

C.   Macro diversity handover

D.   All of the above

39: What can be the maximum distance of a WiMAX connection?

A.   30 km

B.   50 km

C.   75 km

D.   None of the above

40: Which of the following parameters are sent by the subscriber station (SS) in the ranging request packet (RNG-REQ) when a subscriber station (SS) wants a VOIP service stream from a base station (BS)?

A.   Timing

B.   Power

C.   Bandwidth

D.   Frequency

41: What is the full form of WiMAX?

A.   Wireless Metropolitan Area Access

B.   World-wide Interoperability for Microwave Access

C.   World-wide Internet Maximum

D.   Wireless with Microwave Access

42: Which of the following is more secure and stronger for the encryption of data?

A.   Data encryption standard (DES)

B.   Advanced encryption standard (AES)

A.  

True 

B.  

False

44: What is the default value of the authorization key (AK) lifetime?

A.   30 minutes

B.   Half day

C.   Seven days

D.   Seventy days

45: Which of the following are true of the 48-bit Base Station ID (BSID)?

A.   It is different from the MAC address of the base station

B.   It is the same as the MAC address of the base station

C.   It includes a 24-bit operator indicator

D.   It includes a 16-bit operator indicator

46: Which of the following is the new scheduling mechanism defined in 802.16e?

A.   Extended real time Polling Service (ErtPS)

B.   Unsolicited Grant Service (UGS)

C.   real time Polling Service (rtPS)

D.   None of the above

A.   Subscriber station (SS)

B.   Base station (BS)

C.   Either of the two

D.   Neither of the two

A.   Uplink

B.   Downlink

C.   Synchronous Link

D.   Asynchronous Link

49: Which of the following is/are included in the subscriber station certificate?

A.   IP address of the base station

B.   Username

C.   Authorization key

D.   MAC address of the base station

50: On which of the following technologies is WiMax based upon?

A.   IEEE 802.11

B.   IEEE 802.3

C.   IEEE 802.16

D.   None of the above