Search Header Logo

1.4 Network Attacks

Authored by Danna Pearsall

Computers

9th Grade

Used 1+ times

1.4 Network Attacks
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

85 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What is an Evil Twin another form of? Choose all that apply.

Network crasher
Rogue Access Point
Wifi Sensor
None of the above

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a wireless access point added to your network that has not been authorized?

Rogue Access Point
Virus
Worm
Trojan

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

What could be a reason to create multiple SSIDs for a Wireless AP? Check all that apply.

Separate corporate employees from visitors
Separate an operational network from a development network
Separate employee roles within an organization
None of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A rogue access point can be either software or hardware.

True
False

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the purposes behind a rogue access point can be to steal credentials.

True
False

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does SOHO stand for?

Significant Offering for Home Office
Small Office Home Office
Special Outside Home Office
Standard Offering for Home Office

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the act of walking around with a laptop computer to find an access point for a wireless network?

Wi-Fi hopping
Laptop sparking
Warwalking
Network jacking

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Computers