
Networks and Security: Quiz 8

Quiz
•
Computers
•
Professional Development
•
Hard
John Coder
FREE Resource
12 questions
Show all answers
1.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Many people today refer to wireless internet as Wi-Fi. Wi-Fi refers to a set of standards that define communication for wireless l__ s. Wi-Fi is a marketing term commissioned by the Wireless Ethernet Compatibility Alliance (WECA). WECA has since renamed their organization Wi-Fi Alliance.
2.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Wi-Fi standards and protocols are based on the 80?.11 family of internet communication standards determined by the Institute of Electrical and Electronics Engineers (IEEE). So, as a security analyst, you might also see Wi-Fi referred to as IEEE 802.11.
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
wir__________ equ_________ pri________ (WEP) is a wireless security protocol designed to provide users with the same level of privacy on wireless network connections as they have on wir__________ network connections. WEP was developed in 1999 and is the oldest of the wireless security standards.
4.
FILL IN THE BLANK QUESTION
1 min • 1 pt
WEP is largely out of use today, but security analysts should still understand WEP in case they encounter it. For example, a network router might have used WEP as the default security protocol and the network administrator never changed it. Or, devices on a network might be too old to support newer Wi-Fi security protocols. Nevertheless, a malicious actor could potentially break the WEP enc____________, so it’s now considered a high-risk security protocol.
5.
FILL IN THE BLANK QUESTION
1 min • 1 pt
Wi-Fi pro______ ac______ (WPA) was developed in 2003 to improve upon WEP, address the security issues that it presented, and replace it. WPA was always intended to be a transitional measure so ba__________ compatibility could be established with older hardware.
6.
FILL IN THE BLANK QUESTION
1 min • 1 pt
The flaws with WEP were in the protocol itself and how the encryption was used. WPA addressed this weakness by using a protocol called Temporal Key Integrity Protocol (TKIP). WPA encryption algorithm uses lar______ sec______ ke______ than WEPs, making it more difficult to guess the key by trial and error.
7.
FILL IN THE BLANK QUESTION
1 min • 1 pt
WPA also includes a mes_______ inte_______ che_______ that includes a message authentication tag with each transmission. If a malicious actor attempts to alter the transmission in any way or resend at another time, WPA’s message integrity check will identify the attack and reject the transmission.
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
Sécurité en ligne

Quiz
•
Professional Development
8 questions
QUARTE - MODULO 1

Quiz
•
Professional Development
10 questions
Kuiz01

Quiz
•
Professional Development
10 questions
Chapter 8 Review Questions

Quiz
•
Professional Development
10 questions
แบบทดสอบก่อนเรียน microbit หน่วยที่ 1

Quiz
•
1st Grade - Professio...
15 questions
Основы сетевых технологий

Quiz
•
Professional Development
15 questions
CCNP-Route-Preassessment

Quiz
•
Professional Development
10 questions
Misión 6 - Fuerza Bruta

Quiz
•
Professional Development
Popular Resources on Wayground
10 questions
Video Games

Quiz
•
6th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
10 questions
UPDATED FOREST Kindness 9-22

Lesson
•
9th - 12th Grade
22 questions
Adding Integers

Quiz
•
6th Grade
15 questions
Subtracting Integers

Quiz
•
7th Grade
20 questions
US Constitution Quiz

Quiz
•
11th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade