Wireless Network Security and Network Security Overview

This is a computer science engineering quiz on cryptography and network security, which includes questions on Wireless Network Security and Network Security Overview.

Start Quiz

Wi-Fi stands for-

Wireless Fidelity Wireless LAN Wireless FLAN None of the mentioned

Wired networks are far more susceptible to eavesdropping and jamming than wireless networks.

True False

“A user intending to connect to one LAN may unintentionally lock onto a wireless access point from the neighboring network.” Which type of Wireless network threat would you classify this under?

Malicious Threat Network Injection Denial Of Service Accidental Association

“When there is a lack of a central point of control.” Which type of Wireless network threat would you classify this under?

Man in the middle attack Identity Theft Ad Hoc Networks Non-Traditional Networks

“When fraud access points are created to access information such as passwords.” Which type of Wireless network threat would you classify this under?

Identity Theft Network Injection Man in the middle attack Malicious Association

“When bogus reconfiguration commands are used to affect routers and switches to degrade network performance.” Which type of Wireless network threat would you classify this under?

Network Injection Malicious Association Man in the middle attack Denial Of Service

“When communication is unknowingly going through an adversary/intermediate.” Which type of Wireless network threat would you classify this under?

Malicious Association Man in the middle attack Network Injection Accidental Association

“When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges.” Which type of Wireless network threat would you classify this under?

Identity Theft. Man in the middle attack Network Injection Accidental Association

SSID stands for –

Secure Service Identifier Secure Set Independent Device Secure Set Identifier Service Set Independent Device

Mobile Device security falls under 3 categories. Which of these is not a valid Mobile Device security category?

Barrier security Traffic security Device security All of the above

“Installation of third party applications are prohibited on many company hardware devices such as laptops, mobiles, etc.” Which Mobile Device security category of implementation does this fall under?

Barrier security Traffic security Device security None of the mentioned

Another name for the Wireless Ethernet 802.11a is-

Wi-Fi Wi-Fi4 Wi-Fi5 Wi-Fi6

VPN stands for –

Visual Performance Node Virtual Private Network Virtual Post Node Virtual Post Network

WPA stands for –

Wired Protected Access Wireless Protected Access Wireless Personal Access Wired Personal Access

Which of these is not a valid Signal-Hiding Technique for Wireless networks?

Reducing the signal strength to the lowest level such that it still provides requisite coverage

Using directional antennas and signal shielding techniques

Installing the wireless access point away from exteriors of the building

None of the mentioned

Quiz/Test Summary
Title: Wireless Network Security and Network Security Overview
Questions: 15
Contributed by:
james