
w4-a2
Authored by LATHA L
Computers
University
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these is NOT a risk when a home wireless router is not securely configured?
An attacker can steal data from any folder with file sharing enabled.
Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.
Only 50 percent of the packets will be encrypted.
Malware can be injected into a computer connected to the WLAN.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?
PIN method
push-button method
piconet method
NFC method
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the unauthorized access of information from a wireless device through a Bluetooth connection called?
bluejacking
bluesnarfing
Bluetooth snatching
Bluetooth spoofing
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these is a vulnerability of MAC address filtering?
The user must enter the MAC.
MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format.
APs use IP addresses instead of MACs.
Not all operating systems support MACs.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of these is NOT a limitation of turning off the SSID broadcast from an AP?
Users can more easily roam from one WLAN to another.
The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.
Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.
Some versions of operating systems favor a network that broadcasts an SSID over one that does not.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the primary weakness of wired equivalent privacy (WEP)?
It functions only on specific brands of APs.
Its usage creates a detectable pattern.
It slows down a WLAN from 104 Mbps to 16 Mbps.
Initialization vectors (IVs) are difficult for users to manage.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
WPA replaces WEP with _________.
WPA2
Temporal Key Integrity Protocol (TKIP)
Cyclic Redundancy Check (CRC)
Message Integrity Check (MIC)
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?