
MCyber_Chap5N6
Quiz
•
Information Technology (IT)
•
Professional Development
•
Practice Problem
•
Easy
Marcus Phang
Used 4+ times
FREE Resource
Enhance your content in a minute
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
City Center Hospital provides WLAN connectivity to its employees. The security policy requires that communication between employee mobile devices and the access points must be encrypted. What is the purpose of this requirement?
Answer explanation
Encrypting data during communication prevents the contents from intercepted communications from being read.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?
Answer explanation
Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network.
A software firewall is used to prevent other users from gaining access to the protected computer.
Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network.
A proxy server is mostly used to filter traffic based on content.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an advantage of SSID cloaking?
Answer explanation
SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be connected to the network, the SSID can be easily discovered.
The best way to secure a wireless network is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in public locations, but an open system authentication could be used in that situation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For which discovery mode will an AP generate the most traffic on a WLAN?
Answer explanation
The two discovery modes are passive and active.
When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients.
In active mode, the client initiates the discovery process instead of the AP.
Mixed mode refers to network mode settings,
Open mode refers to security parameter settings.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
At a local college, students are allowed to connect to the wireless network without using a password. Which mode is the access point using?
Answer explanation
Network mode is not an authentication mode, it refers to WLAN standards for 802.11a/b/g/n/ac/ad and the ability for access points to operate in mixed mode to support different standards, but it is not an authentication mode.
Open authentication is a null authentication mode because wireless connectivity is granted to any wireless device. This authentication is used where security is not a concern.
Passive mode is not an authentication mode, it refers to the open advertisement of the SSID, standards, and security settings by an access point.
Shared-key authentication uses a pre-shared key between the client and the access point.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
Answer explanation
Configuring the cell phone to act as a wireless access point means that the cell phone is now a rogue access point.
The employee unknowingly breached the security of the company network by allowing a user to access the network without connecting through the company access point.
Cracking is the process of obtaining passwords from data stored or transmitted on a network.
Denial of service attacks refer to sending large amounts of data to a networked device, such as a server, to prevent legitimate access to the server.
Spoofing refers to access gained to a network or data by an attacker appearing to be a legitimate network device or user.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?
Answer explanation
Denial of service attacks can be the result of improperly configured devices which can disable the WLAN.
Accidental interference from devices such as microwave ovens and cordless phones can impact both the security and performance of a WLAN.
Man-in-the-middle attacks can allow an attacker to intercept data.
Rogue access points can allow unauthorized users to access the wireless network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
22 questions
Canvas Workshop Quiz
Quiz
•
Professional Development
22 questions
Information Security Controls Quiz
Quiz
•
Professional Development
25 questions
DCP Utilization and Maintenance
Quiz
•
Professional Development
23 questions
KUIZ INTERAKTIF: PENGETAHUAN YOUTUBE
Quiz
•
Professional Development
22 questions
Sharing Session AGIT - Network
Quiz
•
Professional Development
25 questions
cryptography
Quiz
•
Professional Development
25 questions
ICT Training MCQ-2082
Quiz
•
Professional Development
27 questions
Examen Acumulativo - AZ-900
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
100 questions
Screening Test Customer Service
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
10 questions
Reading a ruler in Inches
Quiz
•
4th Grade - Professio...
16 questions
Parallel, Perpendicular, and Intersecting Lines
Quiz
•
KG - Professional Dev...
12 questions
Valentines Day Trivia
Quiz
•
Professional Development
