Cyber Review Quiz

Cyber Review Quiz

1st Grade

14 Qs

quiz-placeholder

Similar activities

INTRODUCTION TO MEDIA AND INFORMATION LITERACY HUMSS

INTRODUCTION TO MEDIA AND INFORMATION LITERACY HUMSS

KG - 11th Grade

14 Qs

1.1.4  Fetch Decode Execute Cycle

1.1.4 Fetch Decode Execute Cycle

1st - 10th Grade

10 Qs

Lec Network 1

Lec Network 1

1st - 3rd Grade

10 Qs

Computer Hardware - Virtual Memory

Computer Hardware - Virtual Memory

1st - 7th Grade

10 Qs

CHAPTER 2 - ITN

CHAPTER 2 - ITN

1st Grade

10 Qs

Computer Network

Computer Network

1st - 5th Grade

16 Qs

Network Characteristics

Network Characteristics

1st - 3rd Grade

12 Qs

Internet services

Internet services

1st Grade

16 Qs

Cyber Review Quiz

Cyber Review Quiz

Assessment

Quiz

Computers

1st Grade

Medium

Created by

Alexander Alves

Used 3+ times

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, if you are experiencing interference traffic on a wireless channel, which is causing some issues during peak data times, changing the affected Wireless Access points to a different channel could help to solve the problem

True

False

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, when your wireless IDS detects a rogue access point, it can be recognized again by its MAC address

True

False

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, lightweight access points do not need any other additional device to function

True

False

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, to help ensure security, a staff policy should be in place when allowing BYOD on your network

True

False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, if your wireless access point is also acting as a DHCP server, restricting the amount of IP addresses available to lease can help to prevent rogue devices connecting to your network

True

False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, Channel Hopping can help to prevent a man-in-the-middle-attack

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

True or False, a rogue access point that meets your networks naming conventions could be considered an evil twin

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?