Explore topic-wise MCQs in Network Security.

This section includes 13 Mcqs, each offering curated multiple-choice questions to sharpen your Network Security knowledge and support exam preparation. Choose a topic below to get started.

1.

WPA stands for

A. Wired Protected Access
B. Wireless Protected Access
C. Wireless Personal Access
D. Wired Personal Access
Answer» C. Wireless Personal Access
2.

Another name for the Wireless Ethernet 802.11a is-

A. Wi-Fi
B. Wi-Fi4
C. Wi-Fi5
D. Wi-Fi6
Answer» D. Wi-Fi6
3.

VPN stands for

A. Visual Performance Node
B. Virtual Private Network
C. Virtual Post Node
D. Virtual Post Network
Answer» C. Virtual Post Node
4.

Installation of third party applications are prohibited on many company hardware devices such as laptops, mobiles, etc. Which Mobile Device security category of implementation does this fall under?

A. Barrier security
B. Traffic security
C. Device security
D. None of the mentioned
Answer» D. None of the mentioned
5.

Mobile Device security falls under 3 categories. Which of these is not a valid Mobile Device security category?

A. Barrier security
B. Traffic security
C. Device security
D. All of the above
Answer» E.
6.

Which of these is not a valid Signal-Hiding Technique for Wireless networks?

A. reducing the signal strength to the lowest level such that it still provides requisite coverage
B. using directional antennas and signal shielding techniques
C. installing the wireless access point away from exteriors of the building
D. none of the mentioned
Answer» E.
7.

When communication is unknowingly going through an adversary/intermediate. Which type of Wireless network threat would you classify this under?

A. Malicious Association
B. Man in the middle attack
C. Network Injection
D. Accidental Association
Answer» C. Network Injection
8.

When bogus reconfiguration commands are used to affect routers and switches to degrade network performance. Which type of Wireless network threat would you classify this under?

A. Network Injection
B. Malicious Association
C. Man in the middle attack
D. Denial Of Service
Answer» B. Malicious Association
9.

When fraud access points are created to access information such as passwords. Which type of Wireless network threat would you classify this under?

A. Identity Theft
B. Network Injection
C. Man in the middle attack
D. Malicious Association
Answer» E.
10.

When there is a lack of a central point of control. Which type of Wireless network threat would you classify this under?

A. Man in the middle attack
B. Identity Theft
C. Ad Hoc Networks
D. Non-Traditional Networks
Answer» D. Non-Traditional Networks
11.

A user intending to connect to one LAN may unintentionally lock onto a wireless access point from the neighboring network. Which type of Wireless network threat would you classify this under?

A. Malicious Threat
B. Network Injection
C. Denial Of Service
D. Accidental Association
Answer» E.
12.

Wired networks are far more susceptible to eavesdropping and jamming than wireless networks.

A. True
B. False
Answer» C.
13.

Wi-Fi stands for-

A. Wireless Fidelity
B. Wireless LAN
C. Wireless FLAN
D. None of the mentioned
Answer» B. Wireless LAN