Wireless Network Security

Wireless Network Security

University

20 Qs

quiz-placeholder

Similar activities

Introduction to Networking

Introduction to Networking

University

15 Qs

KB #1 IOT Fundamental 2023

KB #1 IOT Fundamental 2023

University

16 Qs

Wired & Wireless Networks & Devices - Chap 10

Wired & Wireless Networks & Devices - Chap 10

11th Grade - University

19 Qs

OSI Model Test

OSI Model Test

University

20 Qs

kollekvium 3

kollekvium 3

University

20 Qs

Kuis IoT 2023

Kuis IoT 2023

University

20 Qs

Pre V-Net Comp ปวช

Pre V-Net Comp ปวช

University

20 Qs

Redes 1

Redes 1

University

20 Qs

Wireless Network Security

Wireless Network Security

Assessment

Quiz

Computers

University

Hard

Created by

Solomon Zewde

Used 62+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which technology is predominately used for contactless payment systems?

wireless local area network (WLAN)

Bluetooth

near field communication (NFC)

Temporal Key Integrity Protocol (TKIP)

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Bluetooth falls under the category of ______________.

local area network (LAN)

short area network (SAN)

paired-device network (PDN)

personal area network (PAN)

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these IEEE WLANs has the highest data rate?

802.11b

802.11n

802.11g

802.11ac

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these technologies is NOT found in a wireless broadband router?

wireless probe

router

firewall

access point

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Why is a rogue AP a security vulnerability?

It uses the weaker IEEE 802.15.ax protocol.

It allows an attacker to bypass many of the network security configurations.

It requires the use of vulnerable wireless probes on all mobile devices.

It conflicts with other network firewalls and can cause them to become disabled.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these is NOT a risk when a home wireless router is not securely configured?

An attacker can steal data from any folder with file sharing enabled.

Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.

Only 50 percent of the packets will be encrypted.

Malware can be injected into a computer connected to the WLAN.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?

PIN method

push-button method

piconet method

NFC method

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?