MCyber_Chap5N6

MCyber_Chap5N6

Professional Development

26 Qs

quiz-placeholder

Similar activities

Cuestionario Nivel

Cuestionario Nivel

Professional Development

22 Qs

CompTIA Security+ (SYO-701) Obj 5

CompTIA Security+ (SYO-701) Obj 5

Professional Development

24 Qs

Infinite Campus Features - Multiple Choice Questions

Infinite Campus Features - Multiple Choice Questions

Professional Development

24 Qs

React and NodeJS with Docker

React and NodeJS with Docker

Professional Development

25 Qs

Computer Hardware and Troubleshooting Quiz

Computer Hardware and Troubleshooting Quiz

Professional Development

28 Qs

Virtually Versed Round 2

Virtually Versed Round 2

Professional Development

30 Qs

Networking and IP Addressing Quiz

Networking and IP Addressing Quiz

Professional Development

30 Qs

Remote Support and Scripting Best Practices

Remote Support and Scripting Best Practices

Professional Development

21 Qs

MCyber_Chap5N6

MCyber_Chap5N6

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Marcus Phang

Used 1+ times

FREE Resource

26 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

City Center Hospital provides WLAN connectivity to its employees. The security policy requires that communication between employee mobile devices and the access points must be encrypted. What is the purpose of this requirement?
To ensure that users who connect to an AP are employees of the hospital
To prevent a computer virus on a mobile device from infecting other devices
To prevent the contents of intercepted messages from being read
To block denial of service attacks originating on the Internet

Answer explanation

Encrypting data during communication prevents the contents from intercepted communications from being read.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?
MAC filtering
Software firewall
WPA encryption
Proxy server

Answer explanation

Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network.

A software firewall is used to prevent other users from gaining access to the protected computer.

Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network.

A proxy server is mostly used to filter traffic based on content.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an advantage of SSID cloaking?
Clients will have to manually identify the SSID to connect to the network.
It is the best way to secure a wireless network.
SSIDs are very difficult to discover because APs do not broadcast them.
It provides free Internet access in public locations where knowing the SSID is of no concern.

Answer explanation

SSID cloaking is a weak security feature that is performed by APs and some wireless routers by allowing the SSID beacon frame to be disabled. Although clients have to manually identify the SSID to be connected to the network, the SSID can be easily discovered.

The best way to secure a wireless network is to use authentication and encryption systems. SSID cloaking does not provide free Internet access in public locations, but an open system authentication could be used in that situation.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

For which discovery mode will an AP generate the most traffic on a WLAN?
Passive mode
Open mode
Mixed mode
Active mode

Answer explanation

The two discovery modes are passive and active.

When operating in passive mode, an AP will generate more traffic as it continually broadcasts beacon frames to potential clients.

In active mode, the client initiates the discovery process instead of the AP.

Mixed mode refers to network mode settings,

Open mode refers to security parameter settings.

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

At a local college, students are allowed to connect to the wireless network without using a password. Which mode is the access point using?
Network
Open
Passive
Shared-key

Answer explanation

Network mode is not an authentication mode, it refers to WLAN standards for 802.11a/b/g/n/ac/ad and the ability for access points to operate in mixed mode to support different standards, but it is not an authentication mode.

Open authentication is a null authentication mode because wireless connectivity is granted to any wireless device. This authentication is used where security is not a concern.

Passive mode is not an authentication mode, it refers to the open advertisement of the SSID, standards, and security settings by an access point.

Shared-key authentication uses a pre-shared key between the client and the access point.

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?
Cracking
Denial of service
Rogue access point
Spoofing

Answer explanation

Configuring the cell phone to act as a wireless access point means that the cell phone is now a rogue access point.

The employee unknowingly breached the security of the company network by allowing a user to access the network without connecting through the company access point.

Cracking is the process of obtaining passwords from data stored or transmitted on a network.

Denial of service attacks refer to sending large amounts of data to a networked device, such as a server, to prevent legitimate access to the server.

Spoofing refers to access gained to a network or data by an attacker appearing to be a legitimate network device or user.

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

The company handbook states that employees cannot have microwave ovens in their offices. Instead, all employees must use the microwave ovens located in the employee cafeteria. What wireless security risk is the company trying to avoid?
Improperly configured devices
Rogue access points
Accidental interference
Interception of data

Answer explanation

Denial of service attacks can be the result of improperly configured devices which can disable the WLAN.

Accidental interference from devices such as microwave ovens and cordless phones can impact both the security and performance of a WLAN.

Man-in-the-middle attacks can allow an attacker to intercept data.

Rogue access points can allow unauthorized users to access the wireless network.

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?