Networks and Security: Quiz 8

Networks and Security: Quiz 8

Professional Development

12 Qs

quiz-placeholder

Similar activities

Computer Problem Solving

Computer Problem Solving

9th Grade - Professional Development

10 Qs

Grovpll

Grovpll

1st Grade - Professional Development

13 Qs

Computer Vocabulary

Computer Vocabulary

Professional Development

15 Qs

Μαθαίνω για το Ιντερνετ

Μαθαίνω για το Ιντερνετ

Professional Development

15 Qs

Quiz Komjardas

Quiz Komjardas

Professional Development

10 Qs

Segurança em Redes Sem Fio

Segurança em Redes Sem Fio

1st Grade - Professional Development

10 Qs

mobile

mobile

KG - Professional Development

13 Qs

latihan-hari-03-digiup-jna

latihan-hari-03-digiup-jna

Professional Development

10 Qs

Networks and Security: Quiz 8

Networks and Security: Quiz 8

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Many people today refer to wireless internet as Wi-Fi. Wi-Fi refers to a set of standards that define communication for wireless l__ s. Wi-Fi is a marketing term commissioned by the Wireless Ethernet Compatibility Alliance (WECA). WECA has since renamed their organization Wi-Fi Alliance.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Wi-Fi standards and protocols are based on the 80?.11 family of internet communication standards determined by the Institute of Electrical and Electronics Engineers (IEEE). So, as a security analyst, you might also see Wi-Fi referred to as IEEE 802.11.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

wir__________ equ_________ pri________ (WEP) is a wireless security protocol designed to provide users with the same level of privacy on wireless network connections as they have on wir__________ network connections. WEP was developed in 1999 and is the oldest of the wireless security standards.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

WEP is largely out of use today, but security analysts should still understand WEP in case they encounter it. For example, a network router might have used WEP as the default security protocol and the network administrator never changed it. Or, devices on a network might be too old to support newer Wi-Fi security protocols. Nevertheless, a malicious actor could potentially break the WEP enc____________, so it’s now considered a high-risk security protocol.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Wi-Fi pro______ ac______ (WPA) was developed in 2003 to improve upon WEP, address the security issues that it presented, and replace it. WPA was always intended to be a transitional measure so ba__________ compatibility could be established with older hardware.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The flaws with WEP were in the protocol itself and how the encryption was used. WPA addressed this weakness by using a protocol called Temporal Key Integrity Protocol (TKIP). WPA encryption algorithm uses lar______ sec______ ke______ than WEPs, making it more difficult to guess the key by trial and error.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

WPA also includes a mes_______ inte_______ che_______ that includes a message authentication tag with each transmission. If a malicious actor attempts to alter the transmission in any way or resend at another time, WPA’s message integrity check will identify the attack and reject the transmission.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?