Which of the following is a type of wireless network security protocol?
a. WPA2
b. TCP/IP
c. HTTPS
d. SSL
Which of the following is a common wireless network threat?
a. Denial-of-service attacks
b. Man-in-the-middle attacks
c. Cross-site scripting attacks
d. SQL injection attacks
Which of the following is not a way to protect a wireless network?
a. Enable WEP encryption
b. Enable MAC address filtering
c. Use strong passwords
d. Disable SSID broadcasting
What does SSID stand for?
a. Service Set Identifier
b. Secure Socket Layer
c. Session Initiation Protocol
d. System Software Interface Design
What is the purpose of MAC address filtering in wireless networks?
a. To prevent unauthorized access
b. To increase network speed
c. To encrypt network traffic
d. To hide the network SSID
Which of the following is a type of wireless network attack?
a. Phishing
b. Smishing
c. Bluejacking
d. Whaling
Which of the following is a tool used for hacking wireless networks?
a. Wireshark
b. Microsoft Excel
c. Adobe Photoshop
d. Notepad
What is the difference between a hub and a switch?
a. A hub is more secure than a switch
b. A hub broadcasts all data to all devices on the network, while a switch only sends data to t
he intended recipient
c. A hub is faster than a switch
d. A hub is more expensive than a switch
What is a rogue access point?
a. An access point installed by an attacker to steal data
b. An access point that is not authorized by the network administrator
c. An access point that is used for legitimate purposes but is not properly secured
d. An access point that is used to launch a denial-of-service attack
Which of the following is a type of wireless network authentication?
a. WEP
b. WPA
c. WPA2
d. SSL
Which of the following is a tool used for cracking wireless network passwords?
a. Wireshark
b. Aircrack-ng
c. Nmap
d. Nessus
Which of the following is a way to protect against wireless network attacks?
a. Use strong passwords
b. Use WEP encryption
c. Disable MAC address filtering
d. Broadcast the network SSID
What is a honeypot?
a. A device used to intercept wireless network traffic
b. A device used to attract attackers
c. A device used to encrypt wireless network traffic
d. A device used to hide the network SSID
Which of the following is a type of wireless network encryption?
a. RSA
b. AES
c. SSL
d. VPN
What is a packet sniffer?
a. A tool used to intercept and analyze network traffic
b. A tool used to crack wireless network passwords
c. A tool used to launch a denial-of-service attack
d. A tool used to intercept and analyze wireless network traffic
What is a brute-force attack?
a. An attack that involves guessing passwords until the correct one is found
b. An attack that involves intercepting network traffic
c. An attack that involves launching malware on a network
d. An attack that involves using social engineering to gain access to a network
What is war driving?
a. The practice of searching for wireless networks while driving
b. The practice of attacking wireless networks while driving
c. The practice of encrypting wireless network traffic while driving
d. The practice of hiding wireless networks while driving
Which of the following is a type of wireless network vulnerability?
a. Cross-site scripting
b. SQL injection
c. Social engineering
d. Rogue access point
Which of the following is a way to secure a wireless network?
a. Use strong passwords
b. Disable encryption
c. Broadcast the network SSID
d. Allow anyone to connect to the network
Which of the following is a type of wireless network security attack?
a. Cross-site scripting
b. SQL injection
c. Denial-of-service
d. Buffer overflow
Which of the following is a way to prevent rogue access points?
a. Use MAC address filtering
b. Broadcast the network SSID
c. Use weak passwords
d. Allow anyone to connect to the network
Which of the following is a type of wireless network vulnerability assessment?
a. Penetration testing
b. Social engineering
c. Phishing
d. Whaling
Which of the following is a way to protect against packet sniffers?
a. Use encryption
b. Disable encryption
c. Broadcast the network SSID
d. Use weak passwords
What is a denial-of-service attack?
a. An attack that involves flooding a network with traffic to make it unavailable
b. An attack that involves intercepting network traffic
c. An attack that involves guessing passwords
d. An attack that involves stealing sensitive information
Which of the following is a type of wireless network vulnerability scanner?
a. Wireshark
b. Nessus
c. Metasploit
d. Aircrack-ng
Which of the following is a type of wireless network exploit?
a. Man-in-the-middle
b. SQL injection
c. Phishing
d. Social engineering
What is a rogue DHCP server?
a. A server that is not authorized by the network administrator
b. A server used to launch a denial-of-service attack
c. A server used to intercept network traffic
d. A server used to encrypt network traffic
What is a man-in-the-middle attack?
a. An attack that involves intercepting network traffic between two parties
b. An attack that involves launching malware on a network
c. An attack that involves guessing passwords
d. An attack that involves flooding a network with traffic
Which of the following is a way to secure a wireless network?
a. Use encryption
b. Disable encryption
c. Broadcast the network SSID
d. Allow anyone to connect to the network
What is a wireless access point?
a. A device used to connect wireless devices to a wired network
b. A device used to connect wired devices to a wireless network
c. A device used to encrypt wireless network traffic
d. A device used to intercept wireless network traffic
What is a war chalking symbol?
a. A symbol used to indicate the presence of a wireless network
b. A symbol used to indicate the location of a rogue access point
c. A symbol used to indicate the strength of a wireless network
d. A symbol used to indicate the presence of a packet sniffer
Which of the following is a type of wireless network protocol?
a. TCP/IP
b. HTTP
c. FTP
d. Wi-Fi
What is a wireless network interface controller?
a. A device used to connect a computer to a wireless network
b. A device used to encrypt wireless network traffic
c. A device used to intercept wireless network traffic
d. A device used to broadcast the network SSID
What is a wireless network analyzer?
a. A tool used to monitor wireless network traffic
b. A tool used to launch denial-of-service attacks
c. A tool used to intercept network traffic
d. A tool used to encrypt network traffic
What is a wireless network security key?
a. A password used to encrypt wireless network traffic
b. A password used to broadcast the network SSID
c. A password used to launch denial-of-service attacks
d. A password used to intercept network traffic
What is a rogue wireless access point?
a. An unauthorized access point that is installed on a network
b. A legitimate access point that is installed on a network
c. A device used to intercept network traffic
d. A device used to encrypt network traffic
What is a wireless network intrusion detection system?
a. A system used to detect unauthorized access to a wireless network
b. A system used to encrypt wireless network traffic
c. A system used to intercept wireless network traffic
d. A system used to broadcast the network SSID
Which of the following is a way to secure a wireless network?
a. Disable SSID broadcast
b. Use weak passwords
c. Allow anyone to connect to the network
d. Disable encryption
What is a wireless network stumbler?
a. A tool used to search for wireless networks
b. A tool used to intercept wireless network traffic
c. A tool used to encrypt network traffic
d. A tool used to launch denial-of-service attacks
What is a wireless network honeypot?
a. A decoy network used to attract attackers
b. A tool used to launch denial-of-service attacks
c. A tool used to intercept network traffic
d. A tool used to encrypt network traffic
What is a wireless network access point controller?
a. A device used to manage multiple access points
b. A device used to encrypt wireless network traffic
c. A device used to intercept network traffic
d. A device used to broadcast the network SSID
Which of the following is a type of wireless network encryption?
a. WEP
b. SSL
c. SSH
d. TCP/IP
What is a wireless network bridge?
a. A device used to connect two wireless networks together
b. A device used to encrypt wireless network traffic
c. A device used to intercept wireless network traffic
d. A device used to broadcast the network SSID
What is a wireless network packet sniffer?
a. A tool used to intercept wireless network traffic
b. A tool used to launch denial-of-service attacks
c. A tool used to encrypt network traffic
d. A tool used to broadcast the network SSID
What is a wireless network wardriving kit?
a. A kit used to search for wireless networks
b. b. A kit used to launch denial-of-service attacks
c. A kit used to intercept network traffic
d. A kit used to encrypt network traffic
What is a wireless network deauthentication attack?
a. An attack that disrupts wireless network connections
b. An attack that intercepts wireless network traffic
c. An attack that encrypts network traffic
d. An attack that broadcasts the network SSID
Which of the following is a tool used to launch wireless network attacks?
a. Aircrack-ng
b. Wireshark
c. Nmap
d. Metasploit
What is a wireless network firewall?
a. A device used to filter network traffic
b. A device used to encrypt wireless network traffic
c. A device used to intercept network traffic
d. A device used to broadcast the network SSID
What is a wireless network hotspot?
a. A location where wireless internet access is provided
b. A device used to launch denial-of-service attacks
c. A device used to intercept network traffic
d. A device used to encrypt network traffic
What is a wireless network amplifier?
a. A device used to increase the signal strength of a wireless network
b. A device used to intercept wireless network traffic
c. A device used to launch denial-of-service attacks
d. A device used to encrypt network traffic