Search Header Logo

Network Security Revision 2

Authored by June Ong

Computers

9th Grade

Used 2+ times

Network Security Revision 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does WEP stand for?

  • (A) Wireless Encryption Protocol

  • (B) Wired Equivalent Privacy

  • (C) Wireless Equivalency Protection

  • (D) Wireless Equipment Protocol

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WEP relies on which of the following to secure data transmission?

  • (A) Public Key

  • (B) Private Key

  • (C) Secret Key

  • (D) Access Key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is used in WEP to ensure that packets are not modified during transmission?

  • (A) Encryption Algorithm

  • (B) Integrity Check (IC)

  • (C) Hash Function

  • (D) Checksum

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many configurations of WEP keys are available?

  • (A) 2

  • (B) 3

  • (C) 4

  • (D) 5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following encryption algorithms does WEP use?

  • (A) AES

  • (B) RC4

  • (C) DES

  • (D) RSA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the limitations of WEP is that it uses:

  • (A) Dynamic keys

  • (B) A single pair of shared keys among users

  • (C) A longer initialization vector

  • (D) Biometric authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the length of WEP's initialization vector (IV)?

  • (A) 12 bits

  • (B) 16 bits

  • (C) 24 bits

  • (D) 32 bits

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?