placeholder image to represent content

Advanced Cybersecurity - Security + Domain 1 Lesson 8 - Wireless and Layer 2 Attacks

Quiz by Jones, Tiffany N

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
45 questions
Show answers
  • Q1
    Which of the following wireless attacks involves an attacker setting up a malicious wireless access point in order to intercept network traffic?
    Denial of Service
    Evil Twin
    Phishing
    Brute Force
    30s
  • Q2
    What type of wireless attack involves forcing a wireless device to reconnect to a malicious network by sending de-authentication packets?
    Man-in-the-Middle Attack
    Packet Sniffing
    Dictionary Attack
    Deauthentication Attack
    30s
  • Q3
    What is the term for a wireless attack where an attacker floods a wireless network with unnecessary or malicious traffic, causing it to become unavailable to legitimate users?
    Brute Force
    Denial of Service
    Evil Twin
    Packet Sniffing
    30s
  • Q4
    Which Layer 2 attack involves flooding the network with gratuitous Address Resolution Protocol (ARP) messages?
    Phishing attack
    Cross-site scripting
    Denial-of-Service (DoS) attack
    ARP poisoning
    30s
  • Q5
    Which Layer 2 attack aims to exhaust the available MAC address table entries on a switch?
    SQL injection
    Cross-site scripting
    MAC flooding
    Phishing attack
    30s
  • Q6
    Which of the following is an example of a Layer 2 attack?
    MAC flooding
    Cross-site scripting
    SQL injection
    Brute-force attack
    30s
  • Q7
    What is a common Layer 2 attack that involves impersonating a legitimate network device?
    DDoS attack
    Ransomware attack
    Phishing attack
    ARP poisoning
    30s
  • Q8
    Which Layer 2 attack involves manipulating the source Media Access Control (MAC) address when sending frames?
    Phishing attack
    MAC cloning
    Cross-site scripting
    SQL injection
    30s
  • Q9
    Which Layer 2 attack involves sending Address Resolution Protocol (ARP) requests for an IP address already associated with another device in the network?
    Phishing attack
    SQL injection
    Cross-site scripting
    ARP cache poisoning
    30s
  • Q10
    What wireless attack involves intercepting and altering communication between two parties without their knowledge?
    Packet sniffing
    Man-in-the-middle attack
    Data breach
    Phishing attack
    30s
  • Q11
    How does a rogue access point deceive users?
    By blocking all network traffic
    By encrypting all network traffic
    By mimicking the name and settings of a legitimate access point
    By generating excessive network traffic
    30s
  • Q12
    How can a rogue access point be defined?
    A software that encrypts network traffic
    A device that amplifies the wireless signal strength
    A legitimate and authorized access point used by the network administrator
    A unauthorized wireless access point that is set up by an attacker
    30s
  • Q13
    What is Bluesnarfing?
    Unauthorized access to a WiFi network
    Unauthorized access to a Bluetooth-enabled device's information
    Manipulation of a website's database
    Phishing attack via email
    30s
  • Q14
    How can Bluesnarfing be prevented?
    Disabling Wi-Fi connections
    Keeping Bluetooth turned off when not in use
    Installing antivirus software on the device
    Regularly changing the device's MAC address
    30s
  • Q15
    What is the primary objective of Bluesnarfing?
    Unauthorized access to a device's data
    Sending spam emails from the device
    Locking the device and demanding ransom
    Recording phone conversations
    30s

Teachers give this quiz to your class