Search Header Logo

Canvas 10

Authored by Nate undefined

Other

University

Used 32+ times

Canvas 10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

30 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

An attacker sits in a company lobby claiming he is waiting to meet someone who works there but arrived early. In the meantime, the attacker pulls out a laptop and, to his delight, can successfully intercept and read data from a wireless network. Which of the following best describes a potential vulnerability the attacker exploited? Select three.

A. The wireless network was open.

B. Someone may have set up a rogue AP.

E. The NAV in the management frames were not encrypted.

D. The access point may have been misconfigured.

C. The AP was not using MAC address filtering.

2.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

The authentication wireless protocols for wireless networks is known as the Extensible Authentication Protocol (EAP). Given this information, which of the following are true statements regarding EAP? Select two.

A. EAP-SSL is used to authenticate users who utilize a browser.

B. EAP is a framework for transporting authentication protocols.

C. EAP is itself the actual authentication protocol used in wireless networks.

D. PEAP is a more flexible EAP scheme because it creates an encrypted channel.

3.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A builder is constructing an edifice for a company. The builder works with the company's networking team to design and install a wireless network. Which of the following represents considerations the networking team is most likely to factor into the design and implementation process? Select two.

A. Perform a site survey to ensure coverage is adequate.

B. Minimize the wireless signal strength outside of the building.

C. Place APs under a raised floor to help prevent theft and tampering.

D. Use a Wi-Fi analyzer before starting the installation to ensure proper coverage.

E. Configure overlapping channels to operate on different frequencies to prevent interference.

4.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A company has adopted the use of the WPA2-Enterprise model for their wireless network. Which of the following accurately describes some of its characteristics? Select two.

A. It uses port security based on the MAC address of the supplicant.

B. EAP-SSL allows it to use digital certificates for authentication.

C. It uses port-based authentication to grant access to clients.

It strictly limits access to the authentication server.

5.

MULTIPLE SELECT QUESTION

30 sec • 1 pt

A company recently had a wireless breach due to an oversight, so they are focused on ensuring all employees, including members of the information technology (IT) department, are trained to the degree appropriate for their role. What major areas should be addressed? Select three.

Emphasize the importance of security.

Ensure protections are not overlooked.

Ensure passive devices are properly shielded.

Ensure devices are properly configured.

Ensure WEP is using a strong and secure IV.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A consumer is using a wireless router that is three years old. They notice their Internet speed has been slowly degrading over the last week. Upon investigation, it is discovered their system was set up as a file server from which movies could be downloaded. Which of the following best represents an action that could have prevented this breach?

Ensured the router was secured and properly configured.

Used a stronger password to prevent unauthorized access.

Replaced the router every two years to benefit from the latest security protocols.

Updated the firmware on the router to ensure all known vulnerabilities have been patched.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

From a network security perspective, which of the following statements best describes the notion of hard edges and blurred edges?

Hard edges include the edge router, walls, and wireless signals.

Blurred edges relate to the blending of wired, wireless, and cellular networks.

Blurred edges have multiple entry points into the network.

Hard edges are typically made up of two components.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?