
MCyber_Chap5N6
Authored by Marcus Phang
Information Technology (IT)
Professional Development
Used 4+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
26 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
City Center Hospital provides WLAN connectivity to its employees. The security policy requires that communication between employee mobile devices and the access points must be encrypted. What is the purpose of this requirement?
Answer explanation
Encrypting data during communication prevents the contents from intercepted communications from being read.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?
Answer explanation
Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network.
A software firewall is used to prevent other users from gaining access to the protected computer.
Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network.
A proxy server is mostly used to filter traffic based on content.
3.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is an advantage of SSID cloaking?
Answer explanation
SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be connected to the network, the SSID can be easily discovered.
The best way to secure a wireless network is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in public locations, but an open system authentication could be used in that situation.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
For which discovery mode will an AP generate the most traffic on a WLAN?
Answer explanation
The two discovery modes are passive and active.
When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients.
In active mode, the client initiates the discovery process instead of the AP.
Mixed mode refers to network mode settings,
Open mode refers to security parameter settings.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
At a local college, students are allowed to connect to the wireless network without using a password. Which mode is the access point using?
Answer explanation
Network mode is not an authentication mode, it refers to WLAN standards for 802.11a/b/g/n/ac/ad and the ability for access points to operate in mixed mode to support different standards, but it is not an authentication mode.
Open authentication is a null authentication mode because wireless connectivity is granted to any wireless device. This authentication is used where security is not a concern.
Passive mode is not an authentication mode, it refers to the open advertisement of the SSID, standards, and security settings by an access point.
Shared-key authentication uses a pre-shared key between the client and the access point.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
Answer explanation
Configuring the cell phone to act as a wireless access point means that the cell phone is now a rogue access point.
The employee unknowingly breached the security of the company network by allowing a user to access the network without connecting through the company access point.
Cracking is the process of obtaining passwords from data stored or transmitted on a network.
Denial of service attacks refer to sending large amounts of data to a networked device, such as a server, to prevent legitimate access to the server.
Spoofing refers to access gained to a network or data by an attacker appearing to be a legitimate network device or user.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?
Answer explanation
Denial of service attacks can be the result of improperly configured devices which can disable the WLAN.
Accidental interference from devices such as microwave ovens and cordless phones can impact both the security and performance of a WLAN.
Man-in-the-middle attacks can allow an attacker to intercept data.
Rogue access points can allow unauthorized users to access the wireless network.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
27 questions
Cybersecurity Core Functions-QUIZ
Quiz
•
Professional Development
25 questions
Artificial Intelligence Quiz
Quiz
•
Professional Development
21 questions
Câu Hỏi Trắc Nghiệm Về iPad và MacBook
Quiz
•
Professional Development
24 questions
SDLC2.0 Solution Release Doc -Quiz #1.1
Quiz
•
Professional Development
25 questions
Quiz on RAM and Storage Devices
Quiz
•
Professional Development
25 questions
Quizz Segurança e conformidade AWS
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...