
Secure a Wireless Network
Quiz by Rachel Hirsch
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
10 questions
Show answers
- Q1Which wireless encryption protocol was created to address the shortcomings of WEP?AESSHAWPA2WPA30s
- Q2What is the default authentication setting on older Access Points (APs)?WPA-PSKOpen authenticationWPA2WEP30s
- Q3Which authentication mechanism limits the devices allowed to connect to an AP by the devices' physical addresses?A Pre-Shared KeyMAC address filteringDisabling the SSID broadcast802.1X30s
- Q4Geofencing is the creation of the virtual geographic boundary. This boundary can be combined with software to trigger an event when a device enters or leaves an area. What technology can be used to define geographic boundaries?BluetoothGPSMAC addressIP address30s
- Q5An administrator is setting up a new SOHO wireless router for a small business. The administrator wants the users to authenticate via 802.1x. Which wireless encryption standard would the administrator deploy and why?The administrator would use Wi-Fi Protection Access 2 (WPA2) Personal. WPA2 Personal enables the administrator to set up authentication via MAC filtering.The administrator would use Wi-Fi Protection Access 2 (WPA2) Personal. WPA2 Personal enables the administrator to set up authentication via a centralized RADIUS server.The administrator would use Wi-Fi Protection Access 2 (WPA2) Enterprise. WPA2 Enterprise enables the administrator to set up authentication via a centralized RADIUS server.The administrator would use Wi-Fi Protection Access 2 (WPA2) Enterprise. WPA2 Enterprise enables the administrator to set up authentication via device location.30s
- Q6A user is configuring a SOHO wireless router for initial home use. What wireless encryption protocol should the user enable for maximum security?WPA2 PersonalWPA EnterpriseWEPWPA Personal30s
- Q7Which protocols are used for integrity checking in wireless networks and what wireless standards are they used in?Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is used in WPA to perform integrity checks. AES is used in WPA2 to perform integrity checks.Temporary Key Integrity Protocol (TKIP) is used in WPA to perform integrity checks. Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) is used in WPA2 to perform integrity checks.Temporary Key Integrity Protocol (TKIP) is used in WPA to perform integrity checks. RC4 is used in WPA2 to perform integrity checks.RC4 is used in WPA to perform integrity checks. AES is used in WPA2 to perform integrity checks.30s
- Q8Which protocol does NOT require a Pre-Shared Key?WPA2 EnterpriseWPA2 PersonalWPA PersonalWEP Shared30s
- Q9What is a weakness of WEP?It uses a short initialization vector, has weak encryption, and sends everything in clear text.It uses a short initialization vector.It sends everything in clear text.It uses weak encryption.30s
- Q10EAP is an authentication framework that specifies secure key distribution methods for mutual authentication. Which three versions are used within wireless networks?LEAP, PEAP-GTC, PEAP-MSCHAPv2EAP-SHA, EAPoL, EAP-MD5PEAP, EAP-FAST, EAP-TLSPEAP, EAPoL, EAP-TLS30s