MCQOPTIONS
Saved Bookmarks
This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.
| 1. |
WPA stands for |
| A. | Wired Protected Access |
| B. | Wireless Protected Access |
| C. | Wireless Personal Access |
| D. | Wired Personal Access |
| Answer» C. Wireless Personal Access | |
| 2. |
Another name for the Wireless Ethernet 802.11a is- |
| A. | Wi-Fi |
| B. | Wi-Fi4 |
| C. | Wi-Fi5 |
| D. | Wi-Fi6 |
| Answer» D. Wi-Fi6 | |
| 3. |
VPN stands for |
| A. | Visual Performance Node |
| B. | Virtual Private Network |
| C. | Virtual Post Node |
| D. | Virtual Post Network |
| Answer» C. Virtual Post Node | |
| 4. |
Installation of third party applications are prohibited on many company hardware devices such as laptops, mobiles, etc. Which Mobile Device security category of implementation does this fall under? |
| A. | Barrier security |
| B. | Traffic security |
| C. | Device security |
| D. | None of the mentioned |
| Answer» D. None of the mentioned | |
| 5. |
Mobile Device security falls under 3 categories. Which of these is not a valid Mobile Device security category? |
| A. | Barrier security |
| B. | Traffic security |
| C. | Device security |
| D. | All of the above |
| Answer» E. | |
| 6. |
Which of these is not a valid Signal-Hiding Technique for Wireless networks? |
| A. | reducing the signal strength to the lowest level such that it still provides requisite coverage |
| B. | using directional antennas and signal shielding techniques |
| C. | installing the wireless access point away from exteriors of the building |
| D. | none of the mentioned |
| Answer» E. | |
| 7. |
When communication is unknowingly going through an adversary/intermediate. Which type of Wireless network threat would you classify this under? |
| A. | Malicious Association |
| B. | Man in the middle attack |
| C. | Network Injection |
| D. | Accidental Association |
| Answer» C. Network Injection | |
| 8. |
When bogus reconfiguration commands are used to affect routers and switches to degrade network performance. Which type of Wireless network threat would you classify this under? |
| A. | Network Injection |
| B. | Malicious Association |
| C. | Man in the middle attack |
| D. | Denial Of Service |
| Answer» B. Malicious Association | |
| 9. |
When fraud access points are created to access information such as passwords. Which type of Wireless network threat would you classify this under? |
| A. | Identity Theft |
| B. | Network Injection |
| C. | Man in the middle attack |
| D. | Malicious Association |
| Answer» E. | |
| 10. |
When there is a lack of a central point of control. Which type of Wireless network threat would you classify this under? |
| A. | Man in the middle attack |
| B. | Identity Theft |
| C. | Ad Hoc Networks |
| D. | Non-Traditional Networks |
| Answer» D. Non-Traditional Networks | |
| 11. |
A user intending to connect to one LAN may unintentionally lock onto a wireless access point from the neighboring network. Which type of Wireless network threat would you classify this under? |
| A. | Malicious Threat |
| B. | Network Injection |
| C. | Denial Of Service |
| D. | Accidental Association |
| Answer» E. | |
| 12. |
Wired networks are far more susceptible to eavesdropping and jamming than wireless networks. |
| A. | True |
| B. | False |
| Answer» C. | |
| 13. |
Wi-Fi stands for- |
| A. | Wireless Fidelity |
| B. | Wireless LAN |
| C. | Wireless FLAN |
| D. | None of the mentioned |
| Answer» B. Wireless LAN | |