Do you know that? 62% can increase their income since becoming a freelancer next

Contact Email: teammmrem@yahoo.com

<< All Upwork (oDesk) and Elance Tests << Upwork (oDesk) test answers << Networking category

Test answers for Wimax Technology Test 2016

(1 / 49) Last updated: December 10
Upwork (oDesk) • Networking
Questions and answers are regularly updated. Answered and not answered tests questions.

This helps getting job: Hundreds of (cover letter examples , interview questions , profile samples ) • Earn on Upwork (oDesk)
Job assistance: jobs popularityfreelance rates

Popular test answers: HTML, .Net, CSS, English, SEO, Photoshop, iOS, Java, Android, Ruby, Python, JavaScript

See all 6 tests answers updated

Find Upwork (oDesk) and Elance test answers on this website:



Collapse | Expand

1 Answered Test Questions:

1. What is the full form of MPDU?

Answers:

• Microwave Protected Data Unit

• Multi-access Protected Data Unit

• MAC Protocol Data Unit

• Media Protocol Data Unit


49 NOT Answered Yet Test Questions:

(hold on, will be updated soon)
2. Which of the following are included in each data SA (Security Association)?

Answers:

• Two traffic encryption keys (TEKs)

• TEK lifetime

• Data SA type indicator

• An authorization key (AK)

• A key encryption key (KEK)

3. Which of the following multiplexing technologies is used in 802.16 for the downlink channel?

Answers:

• TDMA

• TDM

• TDD

• FDD

4. Which of the following management connections is used to send messages related to DHCP, SNMP, TFTP etc?

Answers:

• Basic connection

• Primary management connection

• Secondary management connection

• Any of the above

5. What is the maximum number of  management connection pairs that can be created when a subscriber station (SS) first connects to a base station (BS)?

Answers:

• One

• Two

• Three

• Four

6. Which of the following FFT (Fast Fourier Transform) sizes are supported in SOFDMA (Scalable OFDMA)?

Answers:

• 128

• 256

• 512

• 1024

• 2048

7. Which version of X.509 certificate is mandatory to be used in the 802.16 standard?

Answers:

• Version 1

• Version 2

• Version 3

• Any of the above

8. What can be the maximum value of the traffic encryption key (TEK) lifetime?

Answers:

• 30 minutes

• Half day

• Seven days

• Seventy days

9. In which of the following topology modes can the 802.16 standard be used?

Answers:

• Point-to-Point

• Point-to-Multipoint

• Mesh

• All of the above

10. Which of the following are managed by the physical layer of the protocol stack in WiMAX?

Answers:

• Error Correction

• Security

• Connections

• Bandwidth Request

11. In the subheader of a MAC frame, what will be the value of FC (fragment control) bits if it is the last fragment of the MSDU?

Answers:

• 00

• 01

• 10

• 11

12. What is the length (size) of a connection identifier (CID)?

Answers:

• 4 bits

• 8 bits

• 16 bits

• 32 bits

13. On which of the following frequency ranges does the first WiMAX standard (IEEE 802.16-2001) operate?

Answers:

• 2-11 GHz

• 5-6 Ghz

• 10-66 GHz

• 2-6 GHz

14. In OFDM the original signal is divided into how many subcarriers or subchannels?

Answers:

• 64

• 128

• 256

• 512

15. How many hash-based message authentication code (HMAC) keys are derived from the authorization key (AK) for communication between the subscriber station (SS) and the base station (BS)?

Answers:

• One

• Two

• Four

• None of the above

16. Which of the following encryption algorithms are included in the 802.16 standard security sublayer?

Answers:

• Data Encryption Standard (DES)

• Advanced Encryption Standard (AES)

• Rivest Shamir Adleman (RSA)

• None of the above

17. Which of the following connections is used for short, time-urgent MAC management messages?

Answers:

• Basic connection

• Primary management connection

• Secondary management connection

• Any of the above

18. Which of the following multiplexing technologies is more spectrum-efficient and cost-efficient?

Answers:

• Frequency Division Multiplexing (FDM)

• Orthogonal Frequency Division Multiplexing (OFDM)

19. State whether true or false:
The MAC layer of WiMAX does not allow variable-sized frames to be constructed and transmitted.

Answers:

• True

• False

20. State whether true or false:
In OFDMA, multiple users can transmit data simultaneously.

Answers:

• True

• False

21. Which of the following multiplexing technologies are used in 802.16?

Answers:

• FDD

• TDMA

• TDD

• TDM

22. Which of the following are included in each authorization SA (Security Association)?

Answers:

• Downlink hash-based message authentication code (DHMAC)

• Uplink hash-based message authentication code (UHMAC)

• Type of data SA

• An authorization key (AK)

• A key encryption key (KEK)

• All of the above

23. State whether true or false:
Communication in WiMAX is connection-oriented.

Answers:

• True

• False

24. Which of the following are the different types of data SAs (Security Associations)?

Answers:

• Primary

• Secondary

• Static

• Dynamic

25. How many different types of uplink scheduling mechanisms are used to control contention between users and to modify their bandwidth requirements in the point to multi-point mode?

Answers:

• 2

• 3

• 4

• 8

26. Which of the following are the new power management operations defined in 802.16e?

Answers:

• Active mode

• Idle mode

• Sleep mode

• All of the above

27. Which of the following sub layers of IEEE 802.16 MAC layer provides functions related to duplexing, framing, QoS and channel access?

Answers:

• Convergence Sublayer (CS)

• Commom Part Sublayer (CPS)

• Security Sublayer (SS)

• None of the above

28. Which of the following are the two types of soft handovers defined in 802.16e?

Answers:

• Fast BS Switching

• Secure BS Switching

• Micro Diversity HandOver

• Macro Diversity HandOver

29. Which of the following modulation technologies is/are supported by 802.16a?

Answers:

• QPSK

• 16QAM

• 64QAM

• All of the above

30. How many types of security associations (SA) are defined in PKMv2 in the 802.16 standard?

Answers:

• One

• Two

• Three

• Four

31. What is the other name for WiMAX?

Answers:

• WLAN

• WMAN

• Wi-Fi

• WAN

32. State whether true or false:
In PKMv2, only the BS can authenticate the SS.

Answers:

• True

• False

33. In VOIP, change in payload and code sizes of MPDUs sent by SS depends on which of the following?

Answers:

• Feedback sent by the SS

• Feedback received from the BS

• Nether of the two

34. Which of the following duplexing technologies does 802.16 support?

Answers:

• FDD

• TDMA

• TDD

• TDM

35. Which of the following certificates is used to allow the base station to identify the subscriber stations?

Answers:

• X.905

• X.509

• X.801

• X.816

36. What is the length (size) of the key encryption (in bits) that the DES (data encryption standard) provides?

Answers:

• 32 bit

• 56 bit

• 64 bit

• 128 bit

37. What is the length (in bits) of the header check sequence (HCS) field in a generic MAC header?

Answers:

• 2

• 4

• 8

• 16

38. In the mobile WiMAX profiles, which of the following is mandatory?

Answers:

• Hard handover

• Soft handover

• Macro diversity handover

• All of the above

39. What can be the maximum distance of a WiMAX connection?

Answers:

• 30 km

• 50 km

• 75 km

• None of the above

40. Which of the following parameters are sent by the subscriber station (SS) in the ranging request packet (RNG-REQ) when a subscriber station (SS) wants a VOIP service stream from a base station (BS)?

Answers:

• Timing

• Power

• Bandwidth

• Frequency

41. What is the full form of WiMAX?

Answers:

• Wireless Metropolitan Area Access

• World-wide Interoperability for Microwave Access

• World-wide Internet Maximum

• Wireless with Microwave Access

42. Which of the following is more secure and stronger for the encryption of data?

Answers:

• Data encryption standard (DES)

• Advanced encryption standard (AES)

43. State whether true or false:
Out of the two MAC header formats defined in the IEEE 802.16 standard, the Generic MAC Header (GMH) frame is the only one used in the downlink

Answers:

• True

• False

44. What is the default value of the authorization key (AK) lifetime?

Answers:

• 30 minutes

• Half day

• Seven days

• Seventy days

45. Which of the following are true of the 48-bit Base Station ID (BSID)?

Answers:

• It is different from the MAC address of the base station

• It is the same as the MAC address of the base station

• It includes a 24-bit operator indicator

• It includes a 16-bit operator indicator

46. Which of the following is the new scheduling mechanism defined in 802.16e?

Answers:

• Extended real time Polling Service (ErtPS)

• Unsolicited Grant Service (UGS)

• real time Polling Service (rtPS)

• None of the above

47. In the point to multi point (PMP) mode, which of the following controls both uplink and downlink scheduling?

Answers:

• Subscriber station (SS)

• Base station (BS)

• Either of the two

• Neither of the two

48. What is the link from the Base Station to the Subscriber Station known as?

Answers:

• Uplink

• Downlink

• Synchronous Link

• Asynchronous Link

49. Which of the following is/are included in the subscriber station certificate?

Answers:

• IP address of the base station

• Username

• Authorization key

• MAC address of the base station

50. On which of the following technologies is WiMax based upon?

Answers:

• IEEE 802.11

• IEEE 802.3

• IEEE 802.16

• None of the above