Tema 4.2 - Wifi advanced

Tema 4.2 - Wifi advanced

University

12 Qs

quiz-placeholder

Similar activities

Module 7 (Fundamentals of Cybersecurity)

Module 7 (Fundamentals of Cybersecurity)

University

10 Qs

Module 1

Module 1

University

9 Qs

CAMBRIDGE - A Level - IT - Network Security

CAMBRIDGE - A Level - IT - Network Security

12th Grade - Professional Development

15 Qs

Network Fundamentals-IOS Operating System Part 1

Network Fundamentals-IOS Operating System Part 1

9th Grade - University

9 Qs

Quiz 1

Quiz 1

University

11 Qs

Active Directory Quiz

Active Directory Quiz

University

12 Qs

Setting Up Computer Servers

Setting Up Computer Servers

University

15 Qs

Seguridad de la Red Grupo 5

Seguridad de la Red Grupo 5

University

10 Qs

Tema 4.2 - Wifi advanced

Tema 4.2 - Wifi advanced

Assessment

Quiz

Computers

University

Hard

Created by

Carlos Calafate

Used 1+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In an 802.11 based communication, the 4 address fields available are used when:

An access point sends a frame using WDS.

A station sends a frame to an access point.

An access point sends a frame to a station.

None of the former.

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The main limitations of mesh topologies under 802.11 (using 1 radio interface) are:

All APs must use the same channel and the same shared key for encryption.

All APs must use the same channel and encryption cannot be used.

All APs must use different channels and encryption cannot be used.

None of the former.

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

If 2 Access Points are connected to each other using WDS, the throughput between them will be maximized when:

Both Access Points act as Repeaters.

Both Access Points act as Bridges.

One Access Point acts as a Repeater and the other one as a Bridge.

It does not matter whether access points are acting as repeaters or bridges.

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The encryption algorithm used by WEP is:

MD5

RC4

AES

A combination of the 3 previous ones.

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The WEP algorithm allows defining:

One key per user.

Four keys per user.

One key for all the users.

Four keys for all the users.

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

The main problem of WEP (excluding the authentication) is:

The size of the encryption key.

The number of keys available.

The IV is small and used in an inadequate manner.

Using the RC4 algorithm.

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

To improve security when using WEP it is recommendable to:

Use Open System authentication and not encrypting user data.

Use Shared Key authentication and not encrypting user data.

Use Open System authentication and encrypt user data using the shared key(s).

Use Shared Key authentication and encrypt user data using the shared key(s).

Create a free account and access millions of resources

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

By signing up, you agree to our Terms of Service & Privacy Policy

Already have an account?