Security+ Ch8

Security+ Ch8

9th - 12th Grade

19 Qs

quiz-placeholder

Similar activities

Wireless Communication Technologies Quiz

Wireless Communication Technologies Quiz

Wireless Network Configuration and Security Quiz

Wireless Network Configuration and Security Quiz

Unit 6 Wireless Networking

Unit 6 Wireless Networking

chp 3 itf+ fc0-u61

chp 3 itf+ fc0-u61

Cybersecurity Review Question on Mobile Security

Cybersecurity Review Question on Mobile Security

Network Security 8

Network Security 8

Port & Mobile Device Security

Port & Mobile Device Security

Wireless Technology Principles and Security

Wireless Technology Principles and Security

Security+ Ch8

Security+ Ch8

Assessment

Quiz

9th - 12th Grade

Hard

Created by

Terry Nguyen

Used 3+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

19 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which technology is predominantly used for contactless payment systems?

Near field communication (NFC)
Wireless local area network (WLAN)
Bluetooth
Radio Frequency ID (RFID)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these Bluetooth attacks involves accessing unauthorized information through a Bluetooth connection?

Bluesnarfing
Bluejacking
Bluecreeping
Bluestealing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a difference between NFC and RFID?

NFC is based on wireless technology while RFID is not
RFID is faster than NFC
RFID is designed for paper-based tags while NFC is not.
NFC devices cannot pair as quickly as RFID devices.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Why is a rogue AP a security vulnerability?

It uses the weaker IEEE 802.11i protocol
It conflicts with other network firewalls and can cause them to become disabled.
It allows an attacker to bypass network security configurations.
It requires the use of vulnerable wireless probes on all mobile devices.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these is NOT a risk when a home wireless router is not securely configured?

Only a small percentage of the total traffic can be encrypted.

An attacker can steal data form any folder with file sharing enabled.

Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.

Malware can be injected into a computer connected to the WLAN

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of these Wi-Fi Protected Setup (WPS) methods is considered one of the more vulnerable methods?

Push-button method
PIN method
Piconet method
NFC method

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Flavio visits a local coffee shop on his way to school and accesses its free Wi-Fi. When he first connects, a screen appears that requires him to first agree to an Acceptable Use Policy (AUP) before continuing. What type of AP has he encountered?

Captive portal
Web-based portal
Rogue portal
Authenticated portal

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?