Search Header Logo
Cybersecurity: Lesson 5.12 - Wireless Devices

Cybersecurity: Lesson 5.12 - Wireless Devices

Assessment

Presentation

Computers

11th Grade

Practice Problem

Medium

Created by

Anonymous Anonymous

Used 3+ times

FREE Resource

9 Slides • 10 Questions

1

media

2

media

3

Multiple Choice

Which of the following is NOT an example of a wireless device?

1

Wi-Fi router

2

Access point

3

Mobile device

4

Ethernet switch

4

media

5

Fill in the Blank

Strategic placement of wireless devices helps ensure optimal ______ and strength.

6

media

7

Multiple Choice

What is the primary goal of a pre-deployment site survey?

1

Install the wireless devices

2

Validate network authentication settings

3

Assess the environment and plan access point placement

4

Ensure devices comply with WPA3 standards

8

media

9

Fill in the Blank

Heat maps use ______ gradients to visualize wireless signal strength.

10

Open Ended

How can heat maps improve wireless network performance, and what tools might be used to create them?

11

media

12

Multiple Choice

Which wireless security standard introduces individualized data encryption for each user?

1

WPA2

2

WPA3

3

WEP

4

AES

13

media

14

Multiple Choice

Which protocol is primarily used for centralized authentication in wireless networks?

1

WPA3

2

RADIUS

3

AES

4

WEP

15

Fill in the Blank

Advanced Encryption Standard (AES) is a ______ protocol used for robust encryption in wireless networks.

16

media

17

Fill in the Blank

Protected Extensible Authentication Protocol (PEAP) provides a secure ______ for authentication.

18

media

19

Multiple Choice

What is the purpose of regularly updating wireless security settings and standards?

1

To improve coverage strength

2

To maintain a secure wireless environment

3

To enhance heat map accuracy

4

To ensure compatibility with older devices

media

Show answer

Auto Play

Slide 1 / 19

SLIDE