Search Header Logo

w4-a2

Authored by LATHA L

Computers

University

Used 1+ times

w4-a2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these is NOT a risk when a home wireless router is not securely configured?

An attacker can steal data from any folder with file sharing enabled.

Usernames, passwords, credit card numbers, and other information sent over the WLAN could be captured by an attacker.

Only 50 percent of the packets will be encrypted.

Malware can be injected into a computer connected to the WLAN.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these Wi-Fi Protected Setup (WPS) methods is vulnerable?

PIN method

push-button method

piconet method

NFC method

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the unauthorized access of information from a wireless device through a Bluetooth connection called?

bluejacking

bluesnarfing

Bluetooth snatching

Bluetooth spoofing

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these is a vulnerability of MAC address filtering?

The user must enter the MAC.

MAC addresses are initially exchanged between wireless devices and the AP in an unencrypted format.

APs use IP addresses instead of MACs.

Not all operating systems support MACs.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of these is NOT a limitation of turning off the SSID broadcast from an AP?

Users can more easily roam from one WLAN to another.

The SSID can easily be discovered, even when it is not contained in beacon frames, because it still is transmitted in other management frames sent by the AP.

Turning off the SSID broadcast may prevent users from being able to freely roam from one AP coverage area to another.

Some versions of operating systems favor a network that broadcasts an SSID over one that does not.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is the primary weakness of wired equivalent privacy (WEP)?

It functions only on specific brands of APs.

Its usage creates a detectable pattern.

It slows down a WLAN from 104 Mbps to 16 Mbps.

Initialization vectors (IVs) are difficult for users to manage.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

WPA replaces WEP with _________.

WPA2

Temporal Key Integrity Protocol (TKIP)

Cyclic Redundancy Check (CRC)

Message Integrity Check (MIC)

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?