CN chapter 5 - Additional questions

CN chapter 5 - Additional questions

Professional Development

20 Qs

quiz-placeholder

Similar activities

AWS Quiz Show 2023 (Week 4)

AWS Quiz Show 2023 (Week 4)

Professional Development

15 Qs

Post-Test Under Cyber Closet Project

Post-Test Under Cyber Closet Project

Professional Development

25 Qs

Security+

Security+

Professional Development

15 Qs

Computer Networking (Sample MCQ)

Computer Networking (Sample MCQ)

Professional Development

20 Qs

Web Pre-Test under Cyber Closet Project

Web Pre-Test under Cyber Closet Project

Professional Development

25 Qs

3 Day Combined

3 Day Combined

Professional Development

20 Qs

Cyber Security

Cyber Security

Professional Development

15 Qs

Linux, Cisco and Cyber

Linux, Cisco and Cyber

Professional Development

21 Qs

CN chapter 5 - Additional questions

CN chapter 5 - Additional questions

Assessment

Quiz

Other

Professional Development

Medium

Created by

Chin Siong Hong

Used 1+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main purpose of authentication in a wireless LAN?

To encrypt data

To ensure only authorized devices can access the network

To increase network speed

To broadcast the SSID

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following authentication methods provides the least security?

Open Authentication

Shared Key Authentication

WPA2 Authentication

EAP Authentication

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In Shared Key Authentication, what is required for a client to successfully authenticate with an access point?

Knowledge of the SSID

A shared secret key

A valid MAC address

A public key

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the term "eavesdropping" refer to in network security?

A) Altering data in transit

B) Monitoring network traffic without authorization

C) Authenticating a user

D) Encrypting data packets

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which encryption algorithm is used in WEP?

AES

RC4

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a significant limitation of WEP?

It uses asymmetric encryption.

It relies on a single shared key.

It encrypts data using AES.

It provides two-sided authentication.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does WPA utilize to improve security over WEP?

Temporal Key Integrity Protocol (TKIP)

Rivest Cipher 4 (RC4)

Advanced Encryption Standard (AES)

Extensible Authentication Protocol (EAP)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?