1. What is the function of a wireless repeater?
A. To block unauthorized access to the network.
B. To extend the range of a wireless network.
C. To convert wired signals to wireless signals.
D. To manage network traffic.
2. What is the purpose of SSID (Service Set Identifier) in a wireless network?
A. To encrypt the data transmitted over the network.
B. To identify the wireless network name.
C. To control access to the wireless network.
D. To boost the wireless signal strength.
3. What is the main advantage of using a mesh network topology for wireless networks?
A. Reduced cost of implementation
B. Increased network coverage and redundancy
C. Simplified network configuration
D. Enhanced security features
4. In the context of wireless security, what does MAC address filtering accomplish?
A. Encrypts all data transmitted over the network.
B. Allows only specific devices to access the network.
C. Extends the range of the wireless network.
D. Speeds up data transfer rates.
5. What is the purpose of the `airplane mode` feature on mobile devices?
A. To increase battery life.
B. To disable all wireless communication technologies.
C. To improve Wi-Fi signal strength.
D. To encrypt all data transmitted over the network.
6. Which of the following is NOT a characteristic of a wireless network?
A. Mobility
B. Security vulnerabilities
C. Physical cables
D. Ease of deployment
7. Which of the following wireless standards offers the highest theoretical data transfer rate?
A. 802.11b
B. 802.11g
C. 802.11n
D. 802.11ax
8. Which of the following is a security risk associated with open (unsecured) wireless networks?
A. Increased data transfer speeds
B. Easy access for hackers to intercept data
C. Reduced network congestion
D. Improved battery life for connected devices
9. What is the purpose of a captive portal in a wireless network?
A. To encrypt all wireless traffic.
B. To provide a landing page for users to authenticate or accept terms of service.
C. To extend the range of the wireless network.
D. To prevent unauthorized access to the network.
10. What does MIMO stand for in the context of wireless networking?
A. Multiple Input Multiple Output
B. Maximum Internet Minimum Output
C. Minimum Input Maximum Output
D. Multiple Internet Management Operation
11. Which wireless security protocol is considered the least secure and should be avoided?
A. WPA3
B. WPA2
C. WEP
D. WPA
12. What is the function of a wireless bridge?
A. To connect two wired networks wirelessly.
B. To prevent unauthorized access to the network.
C. To encrypt all wireless traffic.
D. To increase the speed of the wireless network.
13. What is the purpose of channel bonding in wireless networks?
A. To reduce interference from other wireless networks.
B. To increase the bandwidth available for data transmission.
C. To improve security by encrypting data.
D. To extend the range of the wireless network.
14. Which of the following is a benefit of using the 5 GHz band over the 2.4 GHz band in wireless networks?
A. Longer range
B. Better penetration through walls
C. Less interference
D. Lower cost
15. Which of the following is a characteristic of a hidden SSID?
A. It improves network security significantly.
B. It makes the network name not broadcasted.
C. It increases the range of the wireless network.
D. It automatically encrypts all data transmitted.
16. Which of the following is a potential cause of slow wireless network speeds?
A. Using a wired connection
B. Too many devices connected to the network
C. Enabling encryption
D. Using a strong password
17. Which of the following is a method to improve wireless network security?
A. Using the default SSID
B. Disabling encryption
C. Enabling MAC address filtering
D. Using a short and simple password
18. Which of the following is a potential drawback of using a wireless network compared to a wired network?
A. Higher data transfer speeds
B. Increased security
C. Greater susceptibility to interference
D. Lower cost
19. What is the role of a wireless controller in a large wireless network deployment?
A. To provide internet access to all devices.
B. To centrally manage and configure multiple access points.
C. To encrypt all wireless traffic.
D. To extend the range of the wireless network.
20. Which frequency band is commonly used by 802.11a wireless networks?
A. 2.4 GHz
B. 5 GHz
C. 900 MHz
D. 60 GHz
21. What is the primary function of an access point (AP) in a wireless network?
A. To provide internet access via Ethernet cables.
B. To act as a central connection point for wireless devices.
C. To encrypt data transmitted over the wireless network.
D. To prevent unauthorized access to the network.
22. What is the difference between WPA2-Personal and WPA2-Enterprise?
A. WPA2-Personal is less secure than WPA2-Enterprise.
B. WPA2-Enterprise uses a central authentication server (RADIUS).
C. WPA2-Personal is only for home networks.
D. There is no difference between them.
23. Which of the following is a reason to use a guest network on a wireless router?
A. To increase the speed of the main network.
B. To provide internet access to visitors without giving them access to the main network`s resources.
C. To encrypt all data transmitted over the main network.
D. To extend the range of the main network.
24. What is the purpose of beamforming in wireless networks?
A. To reduce interference from other wireless networks.
B. To focus the wireless signal towards the receiving device.
C. To encrypt all data transmitted over the network.
D. To extend the range of the wireless network.
25. What is the main advantage of using Wi-Fi 6 (802.11ax) over previous Wi-Fi standards?
A. Lower cost
B. Longer range
C. Increased network capacity and efficiency
D. Simplified network configuration
26. What is the purpose of a directional antenna in a wireless network?
A. To broadcast the signal in all directions equally.
B. To focus the signal in a specific direction.
C. To reduce interference from other networks.
D. To increase the range of the wireless network.
27. Which wireless technology is commonly used for short-range communication between devices, such as headphones and smartphones?
A. Wi-Fi
B. Bluetooth
C. Cellular
D. Satellite
28. What is the purpose of WPS (Wi-Fi Protected Setup)?
A. To simplify the process of connecting devices to a wireless network.
B. To encrypt all data transmitted over the network.
C. To prevent unauthorized access to the network.
D. To increase the range of the wireless network.
29. What is the purpose of QoS (Quality of Service) in wireless networks?
A. To encrypt all wireless traffic.
B. To prioritize certain types of network traffic.
C. To extend the range of the wireless network.
D. To prevent unauthorized access to the network.
30. Which of the following is a common cause of interference in wireless networks?
A. Using a strong password
B. Other wireless devices operating on the same frequency
C. Enabling encryption
D. Using a wired connection