
Advanced Cybersecurity - Security + Domain 1 Lesson 8 - Wireless and Layer 2 Attacks
Quiz by Jones, Tiffany N
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
45 questions
Show answers
- Q1Which of the following wireless attacks involves an attacker setting up a malicious wireless access point in order to intercept network traffic?Denial of ServiceEvil TwinPhishingBrute Force30s
- Q2What type of wireless attack involves forcing a wireless device to reconnect to a malicious network by sending de-authentication packets?Man-in-the-Middle AttackPacket SniffingDictionary AttackDeauthentication Attack30s
- Q3What is the term for a wireless attack where an attacker floods a wireless network with unnecessary or malicious traffic, causing it to become unavailable to legitimate users?Brute ForceDenial of ServiceEvil TwinPacket Sniffing30s
- Q4Which Layer 2 attack involves flooding the network with gratuitous Address Resolution Protocol (ARP) messages?Phishing attackCross-site scriptingDenial-of-Service (DoS) attackARP poisoning30s
- Q5Which Layer 2 attack aims to exhaust the available MAC address table entries on a switch?SQL injectionCross-site scriptingMAC floodingPhishing attack30s
- Q6Which of the following is an example of a Layer 2 attack?MAC floodingCross-site scriptingSQL injectionBrute-force attack30s
- Q7What is a common Layer 2 attack that involves impersonating a legitimate network device?DDoS attackRansomware attackPhishing attackARP poisoning30s
- Q8Which Layer 2 attack involves manipulating the source Media Access Control (MAC) address when sending frames?Phishing attackMAC cloningCross-site scriptingSQL injection30s
- Q9Which Layer 2 attack involves sending Address Resolution Protocol (ARP) requests for an IP address already associated with another device in the network?Phishing attackSQL injectionCross-site scriptingARP cache poisoning30s
- Q10What wireless attack involves intercepting and altering communication between two parties without their knowledge?Packet sniffingMan-in-the-middle attackData breachPhishing attack30s
- Q11How does a rogue access point deceive users?By blocking all network trafficBy encrypting all network trafficBy mimicking the name and settings of a legitimate access pointBy generating excessive network traffic30s
- Q12How can a rogue access point be defined?A software that encrypts network trafficA device that amplifies the wireless signal strengthA legitimate and authorized access point used by the network administratorA unauthorized wireless access point that is set up by an attacker30s
- Q13What is Bluesnarfing?Unauthorized access to a WiFi networkUnauthorized access to a Bluetooth-enabled device's informationManipulation of a website's databasePhishing attack via email30s
- Q14How can Bluesnarfing be prevented?Disabling Wi-Fi connectionsKeeping Bluetooth turned off when not in useInstalling antivirus software on the deviceRegularly changing the device's MAC address30s
- Q15What is the primary objective of Bluesnarfing?Unauthorized access to a device's dataSending spam emails from the deviceLocking the device and demanding ransomRecording phone conversations30s