MCQOPTIONS
Saved Bookmarks
This section includes 4 Mcqs, each offering curated multiple-choice questions to sharpen your Computer Networks knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
Unauthorised access of information from a wireless device through a bluetooth connection is called _________ |
| A. | bluemaking |
| B. | bluesnarfing |
| C. | bluestring |
| D. | bluescoping |
| Answer» C. bluestring | |
| 2. |
THE_BLUETOOTH_SUPPORTS?$ |
| A. | point-to-point connections |
| B. | point-to-multipoint connection |
| C. | both point-to-point connections and point-to-multipoint connection |
| D. | none of the mentioned |
| Answer» D. none of the mentioned | |
| 3. |
A_scatternet_can_have_maximum$ |
| A. | 10 piconets |
| B. | 20 piconets |
| C. | 30 piconets |
| D. | 40 piconets |
| Answer» B. 20 piconets | |
| 4. |
Bluetooth transceiver devices operate in ______ band? |
| A. | 2.4 GHz ISM |
| B. | 2.5 GHz ISM |
| C. | 2.6 GHz ISM |
| D. | 2.7 GHz ISM |
| Answer» B. 2.5 GHz ISM | |