Search Header Logo

Networks and Security: Quiz 8

Authored by John Coder

Computers

Professional Development

Networks and Security: Quiz 8
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Many people today refer to wireless internet as Wi-Fi. Wi-Fi refers to a set of standards that define communication for wireless l__ s. Wi-Fi is a marketing term commissioned by the Wireless Ethernet Compatibility Alliance (WECA). WECA has since renamed their organization Wi-Fi Alliance.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Wi-Fi standards and protocols are based on the 80?.11 family of internet communication standards determined by the Institute of Electrical and Electronics Engineers (IEEE). So, as a security analyst, you might also see Wi-Fi referred to as IEEE 802.11.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

wir__________ equ_________ pri________ (WEP) is a wireless security protocol designed to provide users with the same level of privacy on wireless network connections as they have on wir__________ network connections. WEP was developed in 1999 and is the oldest of the wireless security standards.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

WEP is largely out of use today, but security analysts should still understand WEP in case they encounter it. For example, a network router might have used WEP as the default security protocol and the network administrator never changed it. Or, devices on a network might be too old to support newer Wi-Fi security protocols. Nevertheless, a malicious actor could potentially break the WEP enc____________, so it’s now considered a high-risk security protocol.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Wi-Fi pro______ ac______ (WPA) was developed in 2003 to improve upon WEP, address the security issues that it presented, and replace it. WPA was always intended to be a transitional measure so ba__________ compatibility could be established with older hardware.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The flaws with WEP were in the protocol itself and how the encryption was used. WPA addressed this weakness by using a protocol called Temporal Key Integrity Protocol (TKIP). WPA encryption algorithm uses lar______ sec______ ke______ than WEPs, making it more difficult to guess the key by trial and error.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

WPA also includes a mes_______ inte_______ che_______ that includes a message authentication tag with each transmission. If a malicious actor attempts to alter the transmission in any way or resend at another time, WPA’s message integrity check will identify the attack and reject the transmission.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?