[go: up one dir, main page]

0% found this document useful (0 votes)
144 views8 pages

Wireless Network Security Quiz

The document discusses various topics related to wireless network security including common threats, protection methods, tools, and technical terms. It provides over 100 multiple choice questions to test knowledge of wireless network protocols, vulnerabilities, attacks, defenses, and technologies. The questions cover topics such as wireless encryption, authentication, rogue access points, packet sniffing, denial of service attacks, and war driving.

Uploaded by

g.d.s.bedi70
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
144 views8 pages

Wireless Network Security Quiz

The document discusses various topics related to wireless network security including common threats, protection methods, tools, and technical terms. It provides over 100 multiple choice questions to test knowledge of wireless network protocols, vulnerabilities, attacks, defenses, and technologies. The questions cover topics such as wireless encryption, authentication, rogue access points, packet sniffing, denial of service attacks, and war driving.

Uploaded by

g.d.s.bedi70
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 8

Which of the following is a type of wireless network security protocol?

a. WPA2
b. TCP/IP
c. HTTPS
d. SSL

Which of the following is a common wireless network threat?


a. Denial-of-service attacks
b. Man-in-the-middle attacks
c. Cross-site scripting attacks
d. SQL injection attacks

Which of the following is not a way to protect a wireless network?


a. Enable WEP encryption
b. Enable MAC address filtering
c. Use strong passwords
d. Disable SSID broadcasting

What does SSID stand for?


a. Service Set Identifier
b. Secure Socket Layer
c. Session Initiation Protocol
d. System Software Interface Design

What is the purpose of MAC address filtering in wireless networks?


a. To prevent unauthorized access
b. To increase network speed
c. To encrypt network traffic
d. To hide the network SSID

Which of the following is a type of wireless network attack?


a. Phishing
b. Smishing
c. Bluejacking
d. Whaling

Which of the following is a tool used for hacking wireless networks?


a. Wireshark
b. Microsoft Excel
c. Adobe Photoshop
d. Notepad
What is the difference between a hub and a switch?
a. A hub is more secure than a switch
b. A hub broadcasts all data to all devices on the network, while a switch only sends data to t
he intended recipient
c. A hub is faster than a switch
d. A hub is more expensive than a switch

What is a rogue access point?


a. An access point installed by an attacker to steal data
b. An access point that is not authorized by the network administrator
c. An access point that is used for legitimate purposes but is not properly secured
d. An access point that is used to launch a denial-of-service attack

Which of the following is a type of wireless network authentication?


a. WEP
b. WPA
c. WPA2
d. SSL

Which of the following is a tool used for cracking wireless network passwords?
a. Wireshark
b. Aircrack-ng
c. Nmap
d. Nessus

Which of the following is a way to protect against wireless network attacks?


a. Use strong passwords
b. Use WEP encryption
c. Disable MAC address filtering
d. Broadcast the network SSID

What is a honeypot?
a. A device used to intercept wireless network traffic
b. A device used to attract attackers
c. A device used to encrypt wireless network traffic
d. A device used to hide the network SSID

Which of the following is a type of wireless network encryption?


a. RSA
b. AES
c. SSL
d. VPN

What is a packet sniffer?


a. A tool used to intercept and analyze network traffic
b. A tool used to crack wireless network passwords
c. A tool used to launch a denial-of-service attack
d. A tool used to intercept and analyze wireless network traffic

What is a brute-force attack?


a. An attack that involves guessing passwords until the correct one is found
b. An attack that involves intercepting network traffic
c. An attack that involves launching malware on a network
d. An attack that involves using social engineering to gain access to a network

What is war driving?


a. The practice of searching for wireless networks while driving
b. The practice of attacking wireless networks while driving
c. The practice of encrypting wireless network traffic while driving
d. The practice of hiding wireless networks while driving

Which of the following is a type of wireless network vulnerability?


a. Cross-site scripting
b. SQL injection
c. Social engineering
d. Rogue access point

Which of the following is a way to secure a wireless network?


a. Use strong passwords
b. Disable encryption
c. Broadcast the network SSID
d. Allow anyone to connect to the network

Which of the following is a type of wireless network security attack?


a. Cross-site scripting
b. SQL injection
c. Denial-of-service
d. Buffer overflow

Which of the following is a way to prevent rogue access points?


a. Use MAC address filtering
b. Broadcast the network SSID
c. Use weak passwords
d. Allow anyone to connect to the network

Which of the following is a type of wireless network vulnerability assessment?


a. Penetration testing
b. Social engineering
c. Phishing
d. Whaling

Which of the following is a way to protect against packet sniffers?


a. Use encryption
b. Disable encryption
c. Broadcast the network SSID
d. Use weak passwords

What is a denial-of-service attack?


a. An attack that involves flooding a network with traffic to make it unavailable
b. An attack that involves intercepting network traffic
c. An attack that involves guessing passwords
d. An attack that involves stealing sensitive information

Which of the following is a type of wireless network vulnerability scanner?


a. Wireshark
b. Nessus
c. Metasploit
d. Aircrack-ng

Which of the following is a type of wireless network exploit?


a. Man-in-the-middle
b. SQL injection
c. Phishing
d. Social engineering

What is a rogue DHCP server?


a. A server that is not authorized by the network administrator
b. A server used to launch a denial-of-service attack
c. A server used to intercept network traffic
d. A server used to encrypt network traffic

What is a man-in-the-middle attack?


a. An attack that involves intercepting network traffic between two parties
b. An attack that involves launching malware on a network
c. An attack that involves guessing passwords
d. An attack that involves flooding a network with traffic

Which of the following is a way to secure a wireless network?


a. Use encryption
b. Disable encryption
c. Broadcast the network SSID
d. Allow anyone to connect to the network

What is a wireless access point?


a. A device used to connect wireless devices to a wired network
b. A device used to connect wired devices to a wireless network
c. A device used to encrypt wireless network traffic
d. A device used to intercept wireless network traffic

What is a war chalking symbol?


a. A symbol used to indicate the presence of a wireless network
b. A symbol used to indicate the location of a rogue access point
c. A symbol used to indicate the strength of a wireless network
d. A symbol used to indicate the presence of a packet sniffer

Which of the following is a type of wireless network protocol?


a. TCP/IP
b. HTTP
c. FTP
d. Wi-Fi

What is a wireless network interface controller?


a. A device used to connect a computer to a wireless network
b. A device used to encrypt wireless network traffic
c. A device used to intercept wireless network traffic
d. A device used to broadcast the network SSID

What is a wireless network analyzer?


a. A tool used to monitor wireless network traffic
b. A tool used to launch denial-of-service attacks
c. A tool used to intercept network traffic
d. A tool used to encrypt network traffic
What is a wireless network security key?
a. A password used to encrypt wireless network traffic
b. A password used to broadcast the network SSID
c. A password used to launch denial-of-service attacks
d. A password used to intercept network traffic

What is a rogue wireless access point?


a. An unauthorized access point that is installed on a network
b. A legitimate access point that is installed on a network
c. A device used to intercept network traffic
d. A device used to encrypt network traffic

What is a wireless network intrusion detection system?


a. A system used to detect unauthorized access to a wireless network
b. A system used to encrypt wireless network traffic
c. A system used to intercept wireless network traffic
d. A system used to broadcast the network SSID

Which of the following is a way to secure a wireless network?


a. Disable SSID broadcast
b. Use weak passwords
c. Allow anyone to connect to the network
d. Disable encryption

What is a wireless network stumbler?


a. A tool used to search for wireless networks
b. A tool used to intercept wireless network traffic
c. A tool used to encrypt network traffic
d. A tool used to launch denial-of-service attacks

What is a wireless network honeypot?


a. A decoy network used to attract attackers
b. A tool used to launch denial-of-service attacks
c. A tool used to intercept network traffic
d. A tool used to encrypt network traffic

What is a wireless network access point controller?


a. A device used to manage multiple access points
b. A device used to encrypt wireless network traffic
c. A device used to intercept network traffic
d. A device used to broadcast the network SSID
Which of the following is a type of wireless network encryption?
a. WEP
b. SSL
c. SSH
d. TCP/IP

What is a wireless network bridge?


a. A device used to connect two wireless networks together
b. A device used to encrypt wireless network traffic
c. A device used to intercept wireless network traffic
d. A device used to broadcast the network SSID

What is a wireless network packet sniffer?


a. A tool used to intercept wireless network traffic
b. A tool used to launch denial-of-service attacks
c. A tool used to encrypt network traffic
d. A tool used to broadcast the network SSID

What is a wireless network wardriving kit?


a. A kit used to search for wireless networks
b. b. A kit used to launch denial-of-service attacks
c. A kit used to intercept network traffic
d. A kit used to encrypt network traffic

What is a wireless network deauthentication attack?


a. An attack that disrupts wireless network connections
b. An attack that intercepts wireless network traffic
c. An attack that encrypts network traffic
d. An attack that broadcasts the network SSID

Which of the following is a tool used to launch wireless network attacks?


a. Aircrack-ng
b. Wireshark
c. Nmap
d. Metasploit

What is a wireless network firewall?


a. A device used to filter network traffic
b. A device used to encrypt wireless network traffic
c. A device used to intercept network traffic
d. A device used to broadcast the network SSID

What is a wireless network hotspot?


a. A location where wireless internet access is provided
b. A device used to launch denial-of-service attacks
c. A device used to intercept network traffic
d. A device used to encrypt network traffic

What is a wireless network amplifier?


a. A device used to increase the signal strength of a wireless network
b. A device used to intercept wireless network traffic
c. A device used to launch denial-of-service attacks
d. A device used to encrypt network traffic

You might also like