Module 11 (Fundamentals of Cybersecurity)

Module 11 (Fundamentals of Cybersecurity)

University

10 Qs

quiz-placeholder

Similar activities

Pretes 3.3 Mengevaluasi permasalahan jaringan nirkabel

Pretes 3.3 Mengevaluasi permasalahan jaringan nirkabel

12th Grade - Professional Development

10 Qs

POST TES 3.3 Mengevaluasi permasalahan jaringan nirkabel

POST TES 3.3 Mengevaluasi permasalahan jaringan nirkabel

12th Grade - Professional Development

10 Qs

Wireless Networking Configuration

Wireless Networking Configuration

University

15 Qs

WLAN Concepts

WLAN Concepts

University

15 Qs

Networking 20200921

Networking 20200921

University

15 Qs

Day 7 - Security I - 1st Review Quiz - Review of Day 6

Day 7 - Security I - 1st Review Quiz - Review of Day 6

University

15 Qs

Computer Networks Mastery Quiz

Computer Networks Mastery Quiz

12th Grade - University

15 Qs

Bluetooth and Wi-Fi Quiz

Bluetooth and Wi-Fi Quiz

7th Grade - University

15 Qs

Module 11 (Fundamentals of Cybersecurity)

Module 11 (Fundamentals of Cybersecurity)

Assessment

Quiz

Computers

University

Medium

Created by

Kelly Gafford

Used 2+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following wireless security protocols is considered the most outdated and vulnerable?

WPA2

WPA3

WEP

WPS

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What type of attack involves flooding a wireless network with traffic to disrupt its operation?

Evil Twin

Bluejacking

Denial of Service

BlueSnarfing

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a tool used in wireless security assessments?

Heat Map

Wi-Fi Analyzer

Channel Overlay

Firewall

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following WLAN standards operates in both the 2.4 GHz AND 5 GHz bands and offers the highest speeds?

802.11ax

802.11ac

802.11g

802.11n

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of a link key in Bluetooth communication?

To establish a connection between devices

To encrypt data transmitted between devices

To identify a device to other devices

To initiate a connection request

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

MAC filtering is a foolproof method to secure a wireless network.

True

False

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WPS (Wi-Fi Protected Setup) is a secure way to connect devices to your network.

True

False

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?