Pillar Craft Week2/3: Reality Check

Pillar Craft Week2/3: Reality Check

University

60 Qs

quiz-placeholder

Similar activities

สอบปลายภาคระบบปฎิบัติการเครื่องแม่ข่าย

สอบปลายภาคระบบปฎิบัติการเครื่องแม่ข่าย

University

60 Qs

CPNS 2021

CPNS 2021

University - Professional Development

60 Qs

Kuis PKN Kelas VII

Kuis PKN Kelas VII

University

60 Qs

Marketing Cloud Email Specialist - new version

Marketing Cloud Email Specialist - new version

1st Grade - University

65 Qs

UAS    Statistika    (2 SKS-S1)

UAS Statistika (2 SKS-S1)

University

60 Qs

Contabilidad

Contabilidad

University

56 Qs

TECHNOLOGY FOR TEACHING AND LEARNING

TECHNOLOGY FOR TEACHING AND LEARNING

University

60 Qs

ກວດກາ MATLAB

ກວດກາ MATLAB

University

57 Qs

Pillar Craft Week2/3: Reality Check

Pillar Craft Week2/3: Reality Check

Assessment

Quiz

Education

University

Medium

Used 2+ times

FREE Resource

60 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The Wi-Fi protocol that is considered obsolete and can be cracked in minutes is:

WEP

WPA2

WPA3

802.11ac

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An attack that sets up a fake access point with the same SSID as the target is known as:

Evil Twin Attack

Man-in-the-Middle Attack

Phishing Attack

Denial of Service Attack

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The WPA2 weakness that makes offline cracking possible is:

The 4-way handshake can be captured and attacked offline

Weak encryption algorithms used in WPA2

Lack of user authentication

Short SSID names

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The main SOC perspective on WEP is:

that it is insecure and outdated

that it is the most secure protocol

that it is recommended for modern networks

that it is faster than WPA2

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A major limitation of WPA3 adoption is:

Limited device compatibility

Increased data transfer speeds

Enhanced user privacy

Widespread support across all devices

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Wi-Fi encryption operates on which layer of the OSI model?

Physical layer

Data Link layer

Network layer

Transport layer

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Using WEP today is considered a critical vulnerability because:

it has well-known security flaws that can be easily exploited

it is the fastest encryption protocol available

it is not compatible with modern devices

it provides stronger security than WPA2

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?