Network Security Revision 2

Network Security Revision 2

9th Grade

15 Qs

quiz-placeholder

Similar activities

G10 IGCSE ICT Security of Data

G10 IGCSE ICT Security of Data

9th - 10th Grade

20 Qs

ENCRYPTION AND CYBERCRIME

ENCRYPTION AND CYBERCRIME

7th - 10th Grade

15 Qs

ITF Cert Review

ITF Cert Review

9th - 12th Grade

15 Qs

Cyber Security

Cyber Security

9th Grade - University

14 Qs

Cryptography Chap-1

Cryptography Chap-1

9th Grade - Professional Development

15 Qs

Network and Mobile devices

Network and Mobile devices

7th - 10th Grade

15 Qs

Network Vocab

Network Vocab

8th - 10th Grade

16 Qs

CSP I - Unit 8 Vocabulary

CSP I - Unit 8 Vocabulary

9th Grade

13 Qs

Network Security Revision 2

Network Security Revision 2

Assessment

Quiz

Computers

9th Grade

Medium

Created by

June Ong

Used 2+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does WEP stand for?

  • (A) Wireless Encryption Protocol

  • (B) Wired Equivalent Privacy

  • (C) Wireless Equivalency Protection

  • (D) Wireless Equipment Protocol

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

WEP relies on which of the following to secure data transmission?

  • (A) Public Key

  • (B) Private Key

  • (C) Secret Key

  • (D) Access Key

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is used in WEP to ensure that packets are not modified during transmission?

  • (A) Encryption Algorithm

  • (B) Integrity Check (IC)

  • (C) Hash Function

  • (D) Checksum

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

How many configurations of WEP keys are available?

  • (A) 2

  • (B) 3

  • (C) 4

  • (D) 5

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following encryption algorithms does WEP use?

  • (A) AES

  • (B) RC4

  • (C) DES

  • (D) RSA

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

One of the limitations of WEP is that it uses:

  • (A) Dynamic keys

  • (B) A single pair of shared keys among users

  • (C) A longer initialization vector

  • (D) Biometric authentication

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the length of WEP's initialization vector (IV)?

  • (A) 12 bits

  • (B) 16 bits

  • (C) 24 bits

  • (D) 32 bits

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?