
MCyber_Chap5N6
Quiz
•
Information Technology (IT)
•
Professional Development
•
Easy
Marcus Phang
Used 1+ times
FREE Resource
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
Encrypting data during communication prevents the contents from intercepted communications from being read.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network.
A software firewall is used to prevent other users from gaining access to the protected computer.
Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network.
A proxy server is mostly used to filter traffic based on content.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be connected to the network, the SSID can be easily discovered.
The best way to secure a wireless network is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in public locations, but an open system authentication could be used in that situation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Answer explanation
The two discovery modes are passive and active.
When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients.
In active mode, the client initiates the discovery process instead of the AP.
Mixed mode refers to network mode settings,
Open mode refers to security parameter settings.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
Network mode is not an authentication mode, it refers to WLAN standards for 802.11a/b/g/n/ac/ad and the ability for access points to operate in mixed mode to support different standards, but it is not an authentication mode.
Open authentication is a null authentication mode because wireless connectivity is granted to any wireless device. This authentication is used where security is not a concern.
Passive mode is not an authentication mode, it refers to the open advertisement of the SSID, standards, and security settings by an access point.
Shared-key authentication uses a pre-shared key between the client and the access point.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
Configuring the cell phone to act as a wireless access point means that the cell phone is now a rogue access point.
The employee unknowingly breached the security of the company network by allowing a user to access the network without connecting through the company access point.
Cracking is the process of obtaining passwords from data stored or transmitted on a network.
Denial of service attacks refer to sending large amounts of data to a networked device, such as a server, to prevent legitimate access to the server.
Spoofing refers to access gained to a network or data by an attacker appearing to be a legitimate network device or user.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Answer explanation
Denial of service attacks can be the result of improperly configured devices which can disable the WLAN.
Accidental interference from devices such as microwave ovens and cordless phones can impact both the security and performance of a WLAN.
Man-in-the-middle attacks can allow an attacker to intercept data.
Rogue access points can allow unauthorized users to access the wireless network.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
30 questions
JavaScript Functions Quiz
Quiz
•
Professional Development
30 questions
Operating Systems Quiz
Quiz
•
Professional Development
30 questions
Pseudo_Codes_4
Quiz
•
Professional Development
31 questions
kelas 11
Quiz
•
Professional Development
28 questions
CLF-C02 - Sim. 28 Questões Semana 4 - AWS Cloud Pratiticioner
Quiz
•
Professional Development
23 questions
MCyber_Chap26N27
Quiz
•
Professional Development
26 questions
Digital Literacy
Quiz
•
Professional Development
Popular Resources on Wayground
20 questions
Halloween Trivia
Quiz
•
6th - 8th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
15 questions
Order of Operations
Quiz
•
5th Grade
20 questions
Halloween
Quiz
•
5th Grade
16 questions
Halloween
Quiz
•
3rd Grade
12 questions
It's The Great Pumpkin Charlie Brown
Quiz
•
1st - 5th Grade
20 questions
Possessive Nouns
Quiz
•
5th Grade
10 questions
Halloween Traditions and Origins
Interactive video
•
5th - 10th Grade
Discover more resources for Information Technology (IT)
10 questions
Halloween
Quiz
•
Professional Development
16 questions
Spooky Season Quiz
Quiz
•
Professional Development
5 questions
11.4.25 Student Engagement & Discourse
Lesson
•
Professional Development
50 questions
ASL Colors and Clothes
Quiz
•
KG - Professional Dev...
15 questions
Ohms Law
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
10 questions
Halloween Trivia
Quiz
•
Professional Development
