
1.4 Network Attacks
Authored by Danna Pearsall
Computers
9th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
85 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What is an Evil Twin another form of? Choose all that apply.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is a wireless access point added to your network that has not been authorized?
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
What could be a reason to create multiple SSIDs for a Wireless AP? Check all that apply.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A rogue access point can be either software or hardware.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
One of the purposes behind a rogue access point can be to steal credentials.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does SOHO stand for?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the act of walking around with a laptop computer to find an access point for a wireless network?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
Popular Resources on Wayground
8 questions
2 Step Word Problems
Quiz
•
KG - University
20 questions
Comparing Fractions
Quiz
•
4th Grade
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
Latin Bases claus(clois,clos, clud, clus) and ped
Quiz
•
6th - 8th Grade
22 questions
fractions
Quiz
•
3rd Grade
7 questions
The Story of Books
Quiz
•
6th - 8th Grade