
Module 11 (Fundamentals of Cybersecurity)
Authored by Kelly Gafford
Computers
University
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following wireless security protocols is considered the most outdated and vulnerable?
WPA2
WPA3
WEP
WPS
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What type of attack involves flooding a wireless network with traffic to disrupt its operation?
Evil Twin
Bluejacking
Denial of Service
BlueSnarfing
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a tool used in wireless security assessments?
Heat Map
Wi-Fi Analyzer
Channel Overlay
Firewall
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following WLAN standards operates in both the 2.4 GHz AND 5 GHz bands and offers the highest speeds?
802.11ax
802.11ac
802.11g
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of a link key in Bluetooth communication?
To establish a connection between devices
To encrypt data transmitted between devices
To identify a device to other devices
To initiate a connection request
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
MAC filtering is a foolproof method to secure a wireless network.
True
False
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
WPS (Wi-Fi Protected Setup) is a secure way to connect devices to your network.
True
False
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?