Networks and Security: Quiz 8

Networks and Security: Quiz 8

Professional Development

12 Qs

quiz-placeholder

Similar activities

POST TES 3.3 Mengevaluasi permasalahan jaringan nirkabel

POST TES 3.3 Mengevaluasi permasalahan jaringan nirkabel

12th Grade - Professional Development

10 Qs

TP-Link Deco X95 網路知識小測驗!

TP-Link Deco X95 網路知識小測驗!

1st Grade - Professional Development

8 Qs

Chapter 8 Communications & Networks

Chapter 8 Communications & Networks

University - Professional Development

15 Qs

Wireless Networking Quiz

Wireless Networking Quiz

Professional Development

16 Qs

Chapter 5 Review Questions

Chapter 5 Review Questions

Professional Development

10 Qs

Routery

Routery

KG - Professional Development

16 Qs

WLAN RG3

WLAN RG3

Professional Development

9 Qs

Tipos de Conexión a internet

Tipos de Conexión a internet

Professional Development

8 Qs

Networks and Security: Quiz 8

Networks and Security: Quiz 8

Assessment

Quiz

Computers

Professional Development

Hard

Created by

John Coder

FREE Resource

12 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Many people today refer to wireless internet as Wi-Fi. Wi-Fi refers to a set of standards that define communication for wireless l__ s. Wi-Fi is a marketing term commissioned by the Wireless Ethernet Compatibility Alliance (WECA). WECA has since renamed their organization Wi-Fi Alliance.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Wi-Fi standards and protocols are based on the 80?.11 family of internet communication standards determined by the Institute of Electrical and Electronics Engineers (IEEE). So, as a security analyst, you might also see Wi-Fi referred to as IEEE 802.11.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

wir__________ equ_________ pri________ (WEP) is a wireless security protocol designed to provide users with the same level of privacy on wireless network connections as they have on wir__________ network connections. WEP was developed in 1999 and is the oldest of the wireless security standards.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

WEP is largely out of use today, but security analysts should still understand WEP in case they encounter it. For example, a network router might have used WEP as the default security protocol and the network administrator never changed it. Or, devices on a network might be too old to support newer Wi-Fi security protocols. Nevertheless, a malicious actor could potentially break the WEP enc____________, so it’s now considered a high-risk security protocol.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

Wi-Fi pro______ ac______ (WPA) was developed in 2003 to improve upon WEP, address the security issues that it presented, and replace it. WPA was always intended to be a transitional measure so ba__________ compatibility could be established with older hardware.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

The flaws with WEP were in the protocol itself and how the encryption was used. WPA addressed this weakness by using a protocol called Temporal Key Integrity Protocol (TKIP). WPA encryption algorithm uses lar______ sec______ ke______ than WEPs, making it more difficult to guess the key by trial and error.

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

WPA also includes a mes_______ inte_______ che_______ that includes a message authentication tag with each transmission. If a malicious actor attempts to alter the transmission in any way or resend at another time, WPA’s message integrity check will identify the attack and reject the transmission.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?