Deck 7: Wireless Lans 2

Full screen (f)
exit full mode
Question
An unauthorized internal access point is a(n)________.

A)evil twin access point
B)rogue access point
Use Space or
up arrow
down arrow
to flip the card.
Question
802.11i is attractive compared with WPA because ________.

A)802.11i offers stronger security
B)802.11i offers quality of service
C)802.11i was standardized by the Wi-Fi Alli
D)all of the above
Question
Who created WPA?

A)the Internet Engineering Task Force
B)the 802.1 Working Group
C)the 802.11 Working Group
D)the Wi-Fi Alliance
Question
802.11i uses WEP as its encryption method.
Question
802.11i and WPA2 are different names for the same standard.
Question
WPA ________.

A)has not been cracked at all
B)has been partially cracked
C)has been fully cracked but the crack is difficult
D)has been fully cracked and the crack only takes minutes
Question
WEP is so strong that it cannot be cracked with readily available software.
Question
WEP is a strong core security protocol.
Question
What security protocol originally came with 802.11 equipment?

A)802.11i
B)WEP
C)both A and B
D)neither A nor B
Question
802.11i uses ________ as its encryption method.

A)RC4
B)802.11s
C)AES-CCMP
D)WPA
Question
How long does it take an attacker to crack WEP today with readily available software?

A)about ten seconds
B)about ten minutes
C)about ten hours
D)WEP cannot be cracked with readily available software.
Question
802.11i offers stronger security than WPA.
Question
What is the strongest security protocol for 802.11 today?

A)802.11i
B)802.11s
C)802.11X
D)WPA
Question
What does the Wi-Fi Alliance call 802.11i?

A)802.1X
B)802.11X
C)WPA
D)WPA2
Question
Breaking into WLANs is ________.

A)drive-by hacking
B)war driving
Question
What security protocol originally came with 802.11 equipment?

A)802.11e
B)802.11i
C)WPA
D)WEP
Question
Which offers stronger security?

A)WPA
B)802.11i
C)Both A and B offer equally strong security.
Question
WPA was created by the the 802.11 Working Group.
Question
To drive around a city looking for working access points that are unprotected is ________.

A)drive-by hacking
B)war driving
Question
A rogue access point is an unauthorized access point.
Question
WPS is applicable to ________.

A)802.1X mode
B)preshared key mode
C)PEAP
D)IPsec
Question
Which of the following is usually set up by a hacker outside the building?

A)a rogue access point
B)an evil twin access point
C)both A and B
D)neither A nor B
Question
Which of the following has a dangerous vulnerability that is causing problems today?

A)PEAP
B)802.11i
C)WPA
D)WPS
Question
A central authentication server is used in 802.11i PSK mode.
Question
The most popular standard for extended 802.1X security is ________.

A)EAP-TTLS
B)MS-EAP
C)EAP-TLS
D)PEAP
Question
A notebook computer configured to act like a real access point is a(n)________.

A)evil twin access point
B)rogue access point
Question
802.1X needs security between the authenticator and the computer in ________.

A)ethernet
B)802.11i
C)both A and B
D)neither A nor B
Question
PSK mode automatically prevents the use of weak keys.
Question
802.1X needs security between the authenticator and the computer in 802.11 wireless access.
Question
If a company uses 802.11i for its core security protocol,an evil twin access point will set up ________ 802.11i connection(s).

A)one
B)two
C)four
D)16
Question
Initial WLAN planning begins with drawing circles on building architecture drawings.
Question
In what mode of 802.11i operation is a central authentication server used?

A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Question
In VPNs designed to frustrate evil twin attacks,the shared secret ________.

A)is transmitted in the clear
B)is transmitted with cryptographic protections
C)is not transmitted
D)any of the above
Question
A notebook computer configured to act like a real access point is a rogue access point.
Question
A denial-of-service attack against a wireless network can be implemented by ________.

A)flooding the network with traffic
B)sending disassociate commands to clients
C)both A and B
D)neither A nor B
Question
The Wi-Fi Alliance refers to 802.1X mode as ________ mode.

A)AES
B)PSK
C)enterprise
D)EAP
Question
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

A)VLANs
B)VPNs
C)PEAP
D)all of the above
Question
802.1X needs security between the authenticator and the computer in Ethernet.
Question
In 802.11i ________,hosts must know a shared initial key.

A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Question
In 802.11i PSK mode,the pass phrase should be at least ________ characters long.

A)6
B)8
C)20
D)128
Question
An 8/1 increase in power corresponds to approximately ________ decibels.

A)3
B)6
C)20
D)none of the above
Question
Centralized access point management ________.

A)increases management costs but provides better control
B)reduces management costs
Question
Managed access points should ________.

A)allow access point power to be adjusted remotely
B)provide constant transmission quality monitoring
C)both A and B
D)neither A nor B
Question
Which of the following was created for PANs?

A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Question
Which of the following can use access points?

A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Question
Which form of Bluetooth has a typical transmission speed of about 200 kbps?

A)Classic Bluetooth
B)High-Speed Bluetooth
C)Low-Energy Bluetooth
D)none of the above
Question
1 Watt represents a dBm value of about ________.

A)10
B)20
C)30
D)We cannot say because only one power is given.
Question
Centralized access point management raises management costs.
Question
Bluetooth is for ________.

A)large WLANs
B)cable replacement
C)both A and B
D)neither A nor B
Question
At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile,which device is initially the master?

A)the Bluetooth phone
B)the Bluetooth headset
C)Both are simultaneously masters and slaves.
Question
A 100/1 increase in power corresponds to approximately ________ decibels.

A)6
B)10
C)20
D)none of the above
Question
Bluetooth is standardized by the ________.

A)802.11 Working Group
B)Wi-Fi Alliance
C)Bluetooth Special Interest Group
D)none of the above
Question
Which form of Bluetooth has a typical transmission speed of about 3 Mbps?

A)Classic Bluetooth
B)High-Speed Bluetooth
C)Low-Energy Bluetooth
D)none of the above
Question
Which of the following can be used to centrally manage remote access points?

A)smart access points
B)WLAN switches
C)both A and B
D)neither A nor B
Question
Managed access points should ________.

A)identify rogue access points
B)be able to push updates out to access points
C)both A and B
D)neither A nor B
Question
In Bluetooth,a master may have multiple slaves.
Question
2 mW represents a dBm value of about ________.

A)2
B)3
C)20
D)We cannot say because only one power is given.
Question
I wish to have a wireless LAN to serve my house.I will use ________.

A)802.11
B)Bluetooth
C)either A or B
Question
An 8/1 decrease in power corresponds to approximately ________ decibels.

A)3
B)6
C)9
D)none of the above
Question
Which form of Bluetooth has a typical transmission speed of about 24 Mbps?

A)Classic Bluetooth
B)High-Speed Bluetooth
C)Low-Energy Bluetooth
D)none of the above
Question
Two devices exchange information about the profiles they support during ________.

A)peering
B)bonding
C)both A and B
D)neither A nor B
Question
In which frequency band can NFC operate?

A)2)4 GHz
B)5 GHz
C)both A and B
D)neither A nor B
Question
Near-field communication has a maximum transmission distance of about ________.

A)400 cm / 200 in
B)40 cm / 20 in
C)4 cm / 2 in
D)The devices must be physically touching.
Question
In Bluetooth,a master can have up to ________ slaves at any moment.

A)1
B)3
C)12
D)none of the above
Question
Which Bluetooth profile would a tablet use with a Bluetooth keyboard?

A)Bluetooth input profile
B)Bluetooth I/O profile
C)human interface device profile
D)none of the above
Question
A typical speed for NFC is about ________.

A)2 kbps
B)200 kbp
C)2 Mbps
D)200 Mbps
Question
UWB channels are wider than a full service band.
Question
A mobile phone may communicate with a headset using the Bluetooth ________ profile.

A)hands-free
B)headset
C)both A and B
D)neither A nor B
Question
Hackers cannot eavesdrop on near-field communication transmissions unless they are almost right next to the device.
Question
Passive RFID chips are powered by ________.

A)a battery
B)the sun
C)body temperature
D)the signal sent by the device querying the RFID chip
Question
Bluetooth uses the ________ service band.

A)2)4 GHz
B)5 GHz
C)both A and B
D)neither A nor B
Question
Classic Bluetooth uses ________.

A)OFDM
B)Frequency Hopping Spread Spectrum
C)both A and B
D)neither A nor B
Question
Two Bluetooth devices will peer ________.

A)the first time they connect
B)every time they connect
C)never
D)after they have first bonded
Question
A mobile phone will communicate with more functionality with a headset if it uses the Bluetooth ________.

A)hands-free profile
B)headset profile
C)Both have about equal functionality.
Question
Compared to 802.11,UWB has greater ________.

A)speed
B)transmission distance
C)reliability
D)all of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Wireless Lans 2
1
An unauthorized internal access point is a(n)________.

A)evil twin access point
B)rogue access point
B
2
802.11i is attractive compared with WPA because ________.

A)802.11i offers stronger security
B)802.11i offers quality of service
C)802.11i was standardized by the Wi-Fi Alli
D)all of the above
A
3
Who created WPA?

A)the Internet Engineering Task Force
B)the 802.1 Working Group
C)the 802.11 Working Group
D)the Wi-Fi Alliance
D
4
802.11i uses WEP as its encryption method.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
802.11i and WPA2 are different names for the same standard.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
WPA ________.

A)has not been cracked at all
B)has been partially cracked
C)has been fully cracked but the crack is difficult
D)has been fully cracked and the crack only takes minutes
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
WEP is so strong that it cannot be cracked with readily available software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
WEP is a strong core security protocol.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
What security protocol originally came with 802.11 equipment?

A)802.11i
B)WEP
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
802.11i uses ________ as its encryption method.

A)RC4
B)802.11s
C)AES-CCMP
D)WPA
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
How long does it take an attacker to crack WEP today with readily available software?

A)about ten seconds
B)about ten minutes
C)about ten hours
D)WEP cannot be cracked with readily available software.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
802.11i offers stronger security than WPA.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
What is the strongest security protocol for 802.11 today?

A)802.11i
B)802.11s
C)802.11X
D)WPA
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
What does the Wi-Fi Alliance call 802.11i?

A)802.1X
B)802.11X
C)WPA
D)WPA2
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
Breaking into WLANs is ________.

A)drive-by hacking
B)war driving
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
What security protocol originally came with 802.11 equipment?

A)802.11e
B)802.11i
C)WPA
D)WEP
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
Which offers stronger security?

A)WPA
B)802.11i
C)Both A and B offer equally strong security.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
WPA was created by the the 802.11 Working Group.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
To drive around a city looking for working access points that are unprotected is ________.

A)drive-by hacking
B)war driving
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
A rogue access point is an unauthorized access point.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
WPS is applicable to ________.

A)802.1X mode
B)preshared key mode
C)PEAP
D)IPsec
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is usually set up by a hacker outside the building?

A)a rogue access point
B)an evil twin access point
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
Which of the following has a dangerous vulnerability that is causing problems today?

A)PEAP
B)802.11i
C)WPA
D)WPS
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
A central authentication server is used in 802.11i PSK mode.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
The most popular standard for extended 802.1X security is ________.

A)EAP-TTLS
B)MS-EAP
C)EAP-TLS
D)PEAP
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
A notebook computer configured to act like a real access point is a(n)________.

A)evil twin access point
B)rogue access point
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
802.1X needs security between the authenticator and the computer in ________.

A)ethernet
B)802.11i
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
PSK mode automatically prevents the use of weak keys.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
802.1X needs security between the authenticator and the computer in 802.11 wireless access.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
If a company uses 802.11i for its core security protocol,an evil twin access point will set up ________ 802.11i connection(s).

A)one
B)two
C)four
D)16
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
Initial WLAN planning begins with drawing circles on building architecture drawings.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
In what mode of 802.11i operation is a central authentication server used?

A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
In VPNs designed to frustrate evil twin attacks,the shared secret ________.

A)is transmitted in the clear
B)is transmitted with cryptographic protections
C)is not transmitted
D)any of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
A notebook computer configured to act like a real access point is a rogue access point.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
A denial-of-service attack against a wireless network can be implemented by ________.

A)flooding the network with traffic
B)sending disassociate commands to clients
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
The Wi-Fi Alliance refers to 802.1X mode as ________ mode.

A)AES
B)PSK
C)enterprise
D)EAP
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

A)VLANs
B)VPNs
C)PEAP
D)all of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
802.1X needs security between the authenticator and the computer in Ethernet.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
In 802.11i ________,hosts must know a shared initial key.

A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
In 802.11i PSK mode,the pass phrase should be at least ________ characters long.

A)6
B)8
C)20
D)128
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
An 8/1 increase in power corresponds to approximately ________ decibels.

A)3
B)6
C)20
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
Centralized access point management ________.

A)increases management costs but provides better control
B)reduces management costs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
Managed access points should ________.

A)allow access point power to be adjusted remotely
B)provide constant transmission quality monitoring
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following was created for PANs?

A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
Which of the following can use access points?

A)802.11
B)Bluetooth
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
Which form of Bluetooth has a typical transmission speed of about 200 kbps?

A)Classic Bluetooth
B)High-Speed Bluetooth
C)Low-Energy Bluetooth
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
1 Watt represents a dBm value of about ________.

A)10
B)20
C)30
D)We cannot say because only one power is given.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
Centralized access point management raises management costs.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
Bluetooth is for ________.

A)large WLANs
B)cable replacement
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile,which device is initially the master?

A)the Bluetooth phone
B)the Bluetooth headset
C)Both are simultaneously masters and slaves.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
A 100/1 increase in power corresponds to approximately ________ decibels.

A)6
B)10
C)20
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
Bluetooth is standardized by the ________.

A)802.11 Working Group
B)Wi-Fi Alliance
C)Bluetooth Special Interest Group
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
Which form of Bluetooth has a typical transmission speed of about 3 Mbps?

A)Classic Bluetooth
B)High-Speed Bluetooth
C)Low-Energy Bluetooth
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following can be used to centrally manage remote access points?

A)smart access points
B)WLAN switches
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Managed access points should ________.

A)identify rogue access points
B)be able to push updates out to access points
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
In Bluetooth,a master may have multiple slaves.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
2 mW represents a dBm value of about ________.

A)2
B)3
C)20
D)We cannot say because only one power is given.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
I wish to have a wireless LAN to serve my house.I will use ________.

A)802.11
B)Bluetooth
C)either A or B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
An 8/1 decrease in power corresponds to approximately ________ decibels.

A)3
B)6
C)9
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
Which form of Bluetooth has a typical transmission speed of about 24 Mbps?

A)Classic Bluetooth
B)High-Speed Bluetooth
C)Low-Energy Bluetooth
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
Two devices exchange information about the profiles they support during ________.

A)peering
B)bonding
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
In which frequency band can NFC operate?

A)2)4 GHz
B)5 GHz
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
Near-field communication has a maximum transmission distance of about ________.

A)400 cm / 200 in
B)40 cm / 20 in
C)4 cm / 2 in
D)The devices must be physically touching.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
In Bluetooth,a master can have up to ________ slaves at any moment.

A)1
B)3
C)12
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
Which Bluetooth profile would a tablet use with a Bluetooth keyboard?

A)Bluetooth input profile
B)Bluetooth I/O profile
C)human interface device profile
D)none of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
A typical speed for NFC is about ________.

A)2 kbps
B)200 kbp
C)2 Mbps
D)200 Mbps
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
UWB channels are wider than a full service band.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
A mobile phone may communicate with a headset using the Bluetooth ________ profile.

A)hands-free
B)headset
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
Hackers cannot eavesdrop on near-field communication transmissions unless they are almost right next to the device.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Passive RFID chips are powered by ________.

A)a battery
B)the sun
C)body temperature
D)the signal sent by the device querying the RFID chip
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
Bluetooth uses the ________ service band.

A)2)4 GHz
B)5 GHz
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
Classic Bluetooth uses ________.

A)OFDM
B)Frequency Hopping Spread Spectrum
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
Two Bluetooth devices will peer ________.

A)the first time they connect
B)every time they connect
C)never
D)after they have first bonded
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
A mobile phone will communicate with more functionality with a headset if it uses the Bluetooth ________.

A)hands-free profile
B)headset profile
C)Both have about equal functionality.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
Compared to 802.11,UWB has greater ________.

A)speed
B)transmission distance
C)reliability
D)all of the above
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 75 flashcards in this deck.