
Canvas 10
Authored by Nate undefined
Other
University
Used 32+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
30 questions
Show all answers
1.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
An attacker sits in a company lobby claiming he is waiting to meet someone who works there but arrived early. In the meantime, the attacker pulls out a laptop and, to his delight, can successfully intercept and read data from a wireless network. Which of the following best describes a potential vulnerability the attacker exploited? Select three.
A. The wireless network was open.
B. Someone may have set up a rogue AP.
E. The NAV in the management frames were not encrypted.
D. The access point may have been misconfigured.
C. The AP was not using MAC address filtering.
2.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
The authentication wireless protocols for wireless networks is known as the Extensible Authentication Protocol (EAP). Given this information, which of the following are true statements regarding EAP? Select two.
A. EAP-SSL is used to authenticate users who utilize a browser.
B. EAP is a framework for transporting authentication protocols.
C. EAP is itself the actual authentication protocol used in wireless networks.
D. PEAP is a more flexible EAP scheme because it creates an encrypted channel.
3.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A builder is constructing an edifice for a company. The builder works with the company's networking team to design and install a wireless network. Which of the following represents considerations the networking team is most likely to factor into the design and implementation process? Select two.
A. Perform a site survey to ensure coverage is adequate.
B. Minimize the wireless signal strength outside of the building.
C. Place APs under a raised floor to help prevent theft and tampering.
D. Use a Wi-Fi analyzer before starting the installation to ensure proper coverage.
E. Configure overlapping channels to operate on different frequencies to prevent interference.
4.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A company has adopted the use of the WPA2-Enterprise model for their wireless network. Which of the following accurately describes some of its characteristics? Select two.
A. It uses port security based on the MAC address of the supplicant.
B. EAP-SSL allows it to use digital certificates for authentication.
C. It uses port-based authentication to grant access to clients.
It strictly limits access to the authentication server.
5.
MULTIPLE SELECT QUESTION
30 sec • 1 pt
A company recently had a wireless breach due to an oversight, so they are focused on ensuring all employees, including members of the information technology (IT) department, are trained to the degree appropriate for their role. What major areas should be addressed? Select three.
Emphasize the importance of security.
Ensure protections are not overlooked.
Ensure passive devices are properly shielded.
Ensure devices are properly configured.
Ensure WEP is using a strong and secure IV.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A consumer is using a wireless router that is three years old. They notice their Internet speed has been slowly degrading over the last week. Upon investigation, it is discovered their system was set up as a file server from which movies could be downloaded. Which of the following best represents an action that could have prevented this breach?
Ensured the router was secured and properly configured.
Used a stronger password to prevent unauthorized access.
Replaced the router every two years to benefit from the latest security protocols.
Updated the firmware on the router to ensure all known vulnerabilities have been patched.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
From a network security perspective, which of the following statements best describes the notion of hard edges and blurred edges?
Hard edges include the edge router, walls, and wireless signals.
Blurred edges relate to the blending of wired, wireless, and cellular networks.
Blurred edges have multiple entry points into the network.
Hard edges are typically made up of two components.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?