
Networks and Security: Quiz 8

Quiz
•
Computers
•
Professional Development
•
Hard
John Coder
FREE Resource
12 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Many people today refer to wireless internet as Wi-Fi. Wi-Fi refers to a set of standards that define communication for wireless l__ s. Wi-Fi is a marketing term commissioned by the Wireless Ethernet Compatibility Alliance (WECA). WECA has since renamed their organization Wi-Fi Alliance.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Wi-Fi standards and protocols are based on the 80?.11 family of internet communication standards determined by the Institute of Electrical and Electronics Engineers (IEEE). So, as a security analyst, you might also see Wi-Fi referred to as IEEE 802.11.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
wir__________ equ_________ pri________ (WEP) is a wireless security protocol designed to provide users with the same level of privacy on wireless network connections as they have on wir__________ network connections. WEP was developed in 1999 and is the oldest of the wireless security standards.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
WEP is largely out of use today, but security analysts should still understand WEP in case they encounter it. For example, a network router might have used WEP as the default security protocol and the network administrator never changed it. Or, devices on a network might be too old to support newer Wi-Fi security protocols. Nevertheless, a malicious actor could potentially break the WEP enc____________, so it’s now considered a high-risk security protocol.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Wi-Fi pro______ ac______ (WPA) was developed in 2003 to improve upon WEP, address the security issues that it presented, and replace it. WPA was always intended to be a transitional measure so ba__________ compatibility could be established with older hardware.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The flaws with WEP were in the protocol itself and how the encryption was used. WPA addressed this weakness by using a protocol called Temporal Key Integrity Protocol (TKIP). WPA encryption algorithm uses lar______ sec______ ke______ than WEPs, making it more difficult to guess the key by trial and error.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
WPA also includes a mes_______ inte_______ che_______ that includes a message authentication tag with each transmission. If a malicious actor attempts to alter the transmission in any way or resend at another time, WPA’s message integrity check will identify the attack and reject the transmission.
Create a free account and access millions of resources
Similar Resources on Wayground
13 questions
Каналы передачи данных

Quiz
•
Professional Development
12 questions
Basic Computer Skills Assessment

Quiz
•
Professional Development
10 questions
Computer Systems

Quiz
•
Professional Development
10 questions
ICT05 - Day 1

Quiz
•
Professional Development
15 questions
Seguridad en Redes Locales

Quiz
•
Professional Development
10 questions
Chapter 9 Review Questions

Quiz
•
Professional Development
10 questions
Conectividad WiFi: Repaso Día 3

Quiz
•
1st Grade - Professio...
10 questions
MateBook D16

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade