Search Header Logo

Testout 8.3 Wireless Network Security Quiz

Authored by len rosen

Computers

12th Grade

Used 3+ times

Testout 8.3 Wireless Network Security Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You want to connect a laptop computer running Windows to a wireless network that uses multiple access points and WPA2-Personal. SSID broadcast has been disabled. What should you do to ensure the strongest authentication and encryption possible?

Configure the connection to use 802.1x authentication and AES encryption.

Configure the connection with a pre-shared key and TKIP encryption.

Configure the connection to use 802.1x authentication and TKIP encryption.

Configure the connection with a pre-shared key and AES encryption.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You need to add security for your wireless network, and you would like to use the most secure method. Which method should you implement?

Kerberos

WPA

WEP

WPA2

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WPA is more secure than WEP but less secure than which of the following?

WEP2

Kerberos

SSID

WPA2

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Kerberos is a method used for what?

Wireless security

Wired security

Authentication

Frequency identification

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following values uniquely identifies the network AP?

Channel

WEP

PS

SSID

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What should you implement to ensure that only paying guests are allowed to use the wireless network and are presented with a login page when they initially connect?

Implement MAC address filtering

Implement pre-shared key authentication

Implement a captive portal

Implement WEP

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is required by a captive portal before allowing access to the wireless network?

Agree to an acceptable use policy, provide a PIN or password, and pay for access

Install specific software and agree to an acceptable use policy

Provide biometric data and a pre-shared key

Agree to an acceptable use policy and install a security certificate

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?