A+ - 16B - Compare Wireless Security Protocols

A+ - 16B - Compare Wireless Security Protocols

Professional Development

24 Qs

quiz-placeholder

Similar activities

Microsoft Security - Exam Review

Microsoft Security - Exam Review

Professional Development

20 Qs

Linkedin CyberSec Test

Linkedin CyberSec Test

Professional Development

20 Qs

A+ - 18A - Configure mobile OS security

A+ - 18A - Configure mobile OS security

Professional Development

21 Qs

Advanced CyberCamp Day 1 & 2 Review

Advanced CyberCamp Day 1 & 2 Review

KG - Professional Development

20 Qs

Net+ Day 2 Ports, Protocols and Network Devices

Net+ Day 2 Ports, Protocols and Network Devices

Professional Development

30 Qs

Internet 101

Internet 101

Professional Development

20 Qs

Understanding Network Infrastructures - Gmetrix study guide

Understanding Network Infrastructures - Gmetrix study guide

11th Grade - Professional Development

26 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

21 Qs

A+ - 16B - Compare Wireless Security Protocols

A+ - 16B - Compare Wireless Security Protocols

Assessment

Passage

Computers

Professional Development

Hard

Created by

Brock McKinley

FREE Resource

24 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which mechanism does WPA use to mitigate attacks against WEP?

Temporal Key Integrity Protocol (TKIP)

Extensible Authentication Protocol (EAP)

Advanced Encryption Standard (AES)

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What cipher does WPA2 use to replace RC4 for encryption?

Advanced Encryption Standard (AES)

Temporal Key Integrity Protocol (TKIP

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

Simultaneous Authentication of Equals (SAE)

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which feature does WPA3 introduce to replace the 4-way handshake in WPA2?

Simultaneous Authentication of Equals (SAE)

Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

Advanced Encryption Standard (AES)

Temporal Key Integrity Protocol (TKIP)

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of authentication does WPA2-PSK use?

Open

Personal

Enterprise

Shared

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What protocol does WPA3 use to replace AES CCMP for encryption?

Temporal Key Integrity Protocol (TKIP)

Simultaneous Authentication of Equals (SAE)

AES Galois Counter Mode Protocol (GCMP)

PMK

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How long must a passphrase be in WPA2 to mitigate passphrase recovery attacks?

At least 8 characters

At least 10 characters

At least 14 characters

At least 16 characters

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the primary advantage of using WPA3 over WPA2 in an open Wi-Fi network?

Enhanced encryption

Simultaneous Authentication of Equals (SAE)

Protected management frames

Wi-Fi Enhanced Open

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?