1.4 security + exam

1.4 security + exam

Professional Development

22 Qs

quiz-placeholder

Similar activities

Part 4.3

Part 4.3

Professional Development

20 Qs

ITF+ Ch8, Network Concepts & Technologies

ITF+ Ch8, Network Concepts & Technologies

Professional Development

20 Qs

CCNA Modules Review Quiz #1

CCNA Modules Review Quiz #1

Professional Development

22 Qs

Cyber 1 Chapter 9: Network Basics

Cyber 1 Chapter 9: Network Basics

9th Grade - Professional Development

18 Qs

Set-up computer networks

Set-up computer networks

Professional Development

25 Qs

A+ - 19D - Identify Basics of Scripting

A+ - 19D - Identify Basics of Scripting

Professional Development

21 Qs

A+ - 14A - Manage Windows Networking

A+ - 14A - Manage Windows Networking

Professional Development

26 Qs

CompTIA A+ Domain 4

CompTIA A+ Domain 4

Professional Development

25 Qs

1.4 security + exam

1.4 security + exam

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Jackson Feldt

FREE Resource

22 questions

Show all answers

1.

FILL IN THE BLANK QUESTION

1 min • 1 pt

attack is a type of cyberattack in which an attacker sets up a rogue Wi-Fi access point with a name (SSID) that is identical or very similar to a legitimate, trusted wireless network.

2.

FILL IN THE BLANK QUESTION

1 min • 1 pt

involves the unauthorized setup of an access point on a network, typically within an organization, with the intention of intercepting network traffic, stealing data, or launching other malicious activities.

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

attack that targets Bluetooth-enabled devices, allowing an attacker to gain unauthorized access to and steal information from these devices.

4.

FILL IN THE BLANK QUESTION

1 min • 1 pt

a benign and relatively harmless practice that involves sending unsolicited messages or business cards to nearby Bluetooth-enabled devices.

5.

FILL IN THE BLANK QUESTION

1 min • 1 pt

a network management feature in Wi-Fi that allows an authorized user or network administrator to terminate a wireless client's connection to an access point.

6.

FILL IN THE BLANK QUESTION

1 min • 1 pt

malicious wireless attack in which an attacker intentionally emits radio frequency interference to disrupt wireless communication on a particular frequency or channel

7.

FILL IN THE BLANK QUESTION

1 min • 1 pt

wireless technology that uses radio waves to communicate between a reader (or interrogator) and RFID tags (or transponders)

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?