MWT .

MWT .

University

25 Qs

quiz-placeholder

Similar activities

Audit Sistem Informasi: M-04 Networking Technology Basic

Audit Sistem Informasi: M-04 Networking Technology Basic

University

20 Qs

(Part 2) Modules 10 – 13: L2 Security and WLANs

(Part 2) Modules 10 – 13: L2 Security and WLANs

University

30 Qs

CompTIA A+ 1002 201-220

CompTIA A+ 1002 201-220

University

20 Qs

UAS Jarkom F

UAS Jarkom F

KG - University

25 Qs

EC8071_CR_Weekly_Quiz_1_(21.07.2020)

EC8071_CR_Weekly_Quiz_1_(21.07.2020)

University

20 Qs

Cyber Security  Quiz

Cyber Security Quiz

University

20 Qs

Networking Concepts

Networking Concepts

12th Grade - University

25 Qs

WNZigBee

WNZigBee

University

20 Qs

MWT .

MWT .

Assessment

Quiz

Other

University

Easy

Created by

Kay Lee

Used 2+ times

FREE Resource

25 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Among the following WLAN configuration, which one of the configurations uses no access points?

Extended Service Set

Independent basic service set

Lightweight Access Point

Basic Service Set

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In a wireless network, the digital signals are converted and transmitted from source to destination in the form of

Digital frequency

Radio wave frequency

Sea wave frequency

Air wave frequency

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Several new coverage cells are required to improve the Wi-Fi network of an organization. Which of the following standard is recommended?

5 GHz provides Increased network capacity with up to 23 non-overlapping channels

5 GHz channel selection requires an autonomous access point

Adjacent cell with overlapping channel uses a repeater access point

Cells that overlap one another are configured to use non-overlapping

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker created a fake access point and targeted a victim machine to access data such as credit card information. Such type of attack is called

Man in the Middle attack

Malicious Association

Network Injection

Identity theft

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A hacker uses an RF jammer and disturbs your communication. His intention is to perform?

Eavesdropping

Denial of service

Physical theft

Phishing attack

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A team leader wants to share a file with his team in the conference room where the signal strength is very poor. So, he decided to share it with Bluetooth. What type of network configuration mode it is treated as?

Mesh Network

Adhoc Network

Infrastructure Network

Star Network

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A wireless LAN will be deployed in a private hospital located in Kuching, Sarawak. Which criteria would be addressed when discussing a potential RF jamming attack?

Data Security

Physical Security

Wiring Closet Security

Access Point Security

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?