placeholder image to represent content

Secure a Wireless Network

Quiz by Rachel Hirsch

Our brand new solo games combine with your quiz, on the same screen

Correct quiz answers unlock more play!

New Quizalize solo game modes
10 questions
Show answers
  • Q1
    Which wireless encryption protocol was created to address the shortcomings of WEP?
    AES
    SHA
    WPA2
    WPA
    30s
  • Q2
    What is the default authentication setting on older Access Points (APs)?
    WPA-PSK
    Open authentication
    WPA2
    WEP
    30s
  • Q3
    Which authentication mechanism limits the devices allowed to connect to an AP by the devices' physical addresses?
    A Pre-Shared Key
    MAC address filtering
    Disabling the SSID broadcast
    802.1X
    30s
  • Q4
    Geofencing is the creation of the virtual geographic boundary. This boundary can be combined with software to trigger an event when a device enters or leaves an area. What technology can be used to define geographic boundaries?
    Bluetooth
    GPS
    MAC address
    IP address
    30s
  • Q5
    An administrator is setting up a new SOHO wireless router for a small business. The administrator wants the users to authenticate via 802.1x. Which wireless encryption standard would the administrator deploy and why?
    The administrator would use Wi-Fi Protection Access 2 (WPA2) Personal. WPA2 Personal enables the administrator to set up authentication via MAC filtering.
    The administrator would use Wi-Fi Protection Access 2 (WPA2) Personal. WPA2 Personal enables the administrator to set up authentication via a centralized RADIUS server.
    The administrator would use Wi-Fi Protection Access 2 (WPA2) Enterprise. WPA2 Enterprise enables the administrator to set up authentication via a centralized RADIUS server.
    The administrator would use Wi-Fi Protection Access 2 (WPA2) Enterprise. WPA2 Enterprise enables the administrator to set up authentication via device location.
    30s
  • Q6
    A user is configuring a SOHO wireless router for initial home use. What wireless encryption protocol should the user enable for maximum security?
    WPA2 Personal
    WPA Enterprise
    WEP
    WPA Personal
    30s
  • Q7
    Which protocols are used for integrity checking in wireless networks and what wireless standards are they used in?
    Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is used in WPA to perform integrity checks. AES is used in WPA2 to perform integrity checks.
    Temporary Key Integrity Protocol (TKIP) is used in WPA to perform integrity checks. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is used in WPA2 to perform integrity checks.
    Temporary Key Integrity Protocol (TKIP) is used in WPA to perform integrity checks. RC4 is used in WPA2 to perform integrity checks.
    RC4 is used in WPA to perform integrity checks. AES is used in WPA2 to perform integrity checks.
    30s
  • Q8
    Which protocol does NOT require a Pre-Shared Key?
    WPA2 Enterprise
    WPA2 Personal
    WPA Personal
    WEP Shared
    30s
  • Q9
    What is a weakness of WEP?
    It uses a short initialization vector, has weak encryption, and sends everything in clear text.
    It uses a short initialization vector.
    It sends everything in clear text.
    It uses weak encryption.
    30s
  • Q10
    EAP is an authentication framework that specifies secure key distribution methods for mutual authentication. Which three versions are used within wireless networks?
    LEAP, PEAP-GTC, PEAP-MSCHAPv2
    EAP-SHA, EAPoL, EAP-MD5
    PEAP, EAP-FAST, EAP-TLS
    PEAP, EAPoL, EAP-TLS
    30s

Teachers give this quiz to your class