
7) Security Risks Part 5
Interactive Video
•
Computers
•
9th - 12th Grade
•
Practice Problem
•
Easy
Maria Cruz Farooqi
Used 5+ times
FREE Resource
16 questions
Show all answers
1.
SLIDE QUESTION
30 sec • Ungraded
2.
SLIDE QUESTION
30 sec • Ungraded
3.
DROPDOWN QUESTION
45 sec • 1 pt
When I visited the coffee shop a few weeks later, I saw a (a) warning customers that “Coffee Shop (b) ” was a rogue access point.
What’s a (c) access point?What’s a rogue access point? Let’s first describe how a (d) gets Internet access.
4.
DRAG AND DROP QUESTION
45 sec • 1 pt
Access points
Homes often connect to the (a) via a wired connection. Imagine that you couldn’t place a (b) in your computer’s room. How else would you (c) it to the Internet? You can use an (d) .
5.
DROPDOWN QUESTION
45 sec • 1 pt
Access points (a) to the Internet via a (b) connection but share it wirelessly with many devices like (c) . You can think of access points as translators between the languages of wireless and wired (d) .
6.
DROPDOWN QUESTION
1 min • 1 pt
Rogue access points
A rogue access point is an access point installed on a network without the network owner’s (a) . Why is this bad?
If an attacker owns the access point, they can (b) (e.g. PII) flowing through the network. This is why the coffee shop provided the (c) to its customers; they wanted to stop an unauthorized access point on their network from intercepting users’ (d) .
7.
DRAG AND DROP QUESTION
45 sec • 1 pt
Recommendations
We should (a) before connecting to a free wireless hotspot in (b) locations such as coffee shops or airports. If we see something odd, we should notify the network owner.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?