NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

12th Grade

14 Qs

quiz-placeholder

Similar activities

Intro to Cybersecurity 3

Intro to Cybersecurity 3

12th Grade - Professional Development

12 Qs

CCST-Local Area Network - Ch 11

CCST-Local Area Network - Ch 11

9th - 12th Grade

12 Qs

mobile

mobile

KG - Professional Development

13 Qs

Firewall UH

Firewall UH

12th Grade

10 Qs

Module 22 - Wireless Networks 3

Module 22 - Wireless Networks 3

9th - 12th Grade

19 Qs

WLAN Concepts

WLAN Concepts

9th - 12th Grade

12 Qs

Testout Wireless Networking

Testout Wireless Networking

9th - 12th Grade

12 Qs

Module Quiz - WLAN Configuration

Module Quiz - WLAN Configuration

12th Grade

15 Qs

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

NETESS 2.0 MODULE 16 QUIZ - Wireless Security Measures

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Ereck Ladd

FREE Resource

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures will prevent wireless clients from seeing that your WLAN is available?

MAC address filtering

disabling SSID broadcast

implementing port forwarding

configuring authentication

Answer explanation

  1. Disabling SSID broadcasts will prevent wireless clients from seeing that your WLAN is available.


2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures will require users to enter a password to access your WLAN?

MAC address filtering

disabling SSID broadcast

implementing port forwarding

configuring authentication

Answer explanation

  1. Configure authentication to quire users to enter a password to access your WLAN.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures will permit or prevent a specific device from accessing your WLAN?

MAC address filtering

disabling SSID broadcast

implementing port forwarding

configuring authentication

Answer explanation

  1. MAC address filtering can be configured to permit or prevent a specific device from accessing your WLAN.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following security measures will send specified traffic to a DMZ server?

MAC address filtering

disabling SSID broadcast

implementing port forwarding

configuring authentication

Answer explanation

  1. Implement port forwarding to end specified traffic to a DMZ server.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of authentication do most access points use by default?

WEP

open

PSK

EAP

Answer explanation

Topic 16.1.0 - The three types of wireless authentication methods are open authentication, PSK, and EAP. The most common default authentication method is open authentication.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a DMZ?

It provides secure connectivity for clients that connect to the internal network through a wireless LAN.

It analyzes traffic for intrusion attempts and sends reports to management stations.

It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.

It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.

Answer explanation

Topic 16.3.0 - The DMZ is an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network. It allows external hosts to access internal servers.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two actions improve security on a wireless network? (Choose two.)

Enable WEP

Keep the default administrator password for the access point

Broadcast the default SSID

Enable MAC filtering

Answer explanation

Topic 16.1.0 - MAC filtering allows an administrator to limit access to a wireless network and to control which devices, based on MAC address, can access the network. The Wired Equivalency Protocol (WEP) is a security feature that encrypts network traffic over the wireless network. WEP uses pre-configured keys to encrypt and decrypt data.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?