NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

12th Grade

14 Qs

quiz-placeholder

Similar activities

Quiz Jaringan Nirkabel

Quiz Jaringan Nirkabel

5th Grade - University

12 Qs

Sending Data across the Internet

Sending Data across the Internet

9th Grade - University

12 Qs

Digital Etiquette

Digital Etiquette

4th Grade - University

15 Qs

CIW

CIW

9th - 12th Grade

15 Qs

Quiz Pengenalan Internet

Quiz Pengenalan Internet

12th Grade

10 Qs

Hardware and Software

Hardware and Software

KG - University

10 Qs

Protecting Yourself Online Lesson 8 of the CIW

Protecting Yourself Online Lesson 8 of the CIW

12th Grade

16 Qs

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Ereck Ladd

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures will prevent wireless clients from seeing that your WLAN is available?

MAC address filtering

disabling SSID broadcast

implementing port forwarding

configuring authentication

Answer explanation

  1. Disabling SSID broadcasts will prevent wireless clients from seeing that your WLAN is available.


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures will require users to enter a password to access your WLAN?

MAC address filtering

disabling SSID broadcast

implementing port forwarding

configuring authentication

Answer explanation

  1. Configure authentication to quire users to enter a password to access your WLAN.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures will permit or prevent a specific device from accessing your WLAN?

MAC address filtering

disabling SSID broadcast

implementing port forwarding

configuring authentication

Answer explanation

  1. MAC address filtering can be configured to permit or prevent a specific device from accessing your WLAN.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures will send specified traffic to a DMZ server?

MAC address filtering

disabling SSID broadcast

implementing port forwarding

configuring authentication

Answer explanation

  1. Implement port forwarding to end specified traffic to a DMZ server.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of authentication do most access points use by default?

WEP

open

PSK

EAP

Answer explanation

Topic 16.1.0 - The three types of wireless authentication methods are open authentication, PSK, and EAP. The most common default authentication method is open authentication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a DMZ?

It provides secure connectivity for clients that connect to the internal network through a wireless LAN.

It analyzes traffic for intrusion attempts and sends reports to management stations.

It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.

It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

Answer explanation

Topic 16.3.0 - The DMZ is an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network. It allows external hosts to access internal servers.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two actions improve security on a wireless network? (Choose two.)

Enable WEP

Keep the default administrator password for the access point

Broadcast the default SSID

Enable MAC filtering

Answer explanation

Topic 16.1.0 - MAC filtering allows an administrator to limit access to a wireless network and to control which devices, based on MAC address, can access the network. The Wired Equivalency Protocol (WEP) is a security feature that encrypts network traffic over the wireless network. WEP uses pre-configured keys to encrypt and decrypt data.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?