
A+ Core II Days 7-9
Authored by Joshua Renihan
Information Technology (IT)
University
Used 7+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
44 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Choose the weakest of the Wi-Fi Security Protocols below.
WEP
WPA
WPA2
WPA3
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which Wi-Fi Security Protocol uses the Simultaneous Authentication of Equals (SAE) method for securing a connection?
WEP
WPA2
WPA3
WPA
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Users connecting to a Wi-Fi network with a shared password is also known as using a (blank).
4-way handshake
802.1X
PSK
RADIUS
Answer explanation
Pre-Shared Key (PSK): Users connect to the network using a shared password or passphrase. This method is suitable for home and small office networks.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which authentication server encrypts only the password, NOT entire packets, when used for network access control?
RADIUS
TACACS+
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
True or False? Extensible Authentication Protocol (EAP) supports Multifactor Authentication (MFA).
True
False
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important to ensure that the manufacturer of your home router is NOT listed in your SSID?
It will cause channels to overlap.
It could easily be confused with another router's SSID in the vicinity of yours.
It prevents attackers from exploiting known vulnerabilities associated with the router's manufacturer.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which tool helps you determine the Wi-Fi channels that others are using in your area so you can avoid overlap?
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?