

MCQOPTIONS
Saved Bookmarks
This section includes 18 Mcqs, each offering curated multiple-choice questions to sharpen your Cyber Security knowledge and support exam preparation. Choose a topic below to get started.
1. |
WPS stands for __________________ |
A. | WiFi Protected System |
B. | WiFi Protected Setup |
C. | WiFi Protocol Setup |
D. | Wireless Protected Setup |
Answer» C. WiFi Protocol Setup | |
2. |
When a wireless user authenticates to any AP, both of them go in the course of four-step authentication progression which is called _____________ |
A. | AP-handshaking |
B. | 4-way handshake |
C. | 4-way connection |
D. | wireless handshaking |
Answer» C. 4-way connection | |
3. |
There are __________ types of wireless authentication modes. |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
4. |
BTS stands for ___________________ |
A. | Basement Transceiver Server |
B. | Base Transmitter Station |
C. | Base Transceiver Server |
D. | Base Transceiver Station |
Answer» E. | |
5. |
THERE_ARE____________TYPES_OF_WIRELESS_AUTHENTICATION_MODES.?$ |
A. | 2 |
B. | 3 |
C. | 4 |
D. | 5 |
Answer» B. 3 | |
6. |
When_a_wireless_user_authenticates_to_any_AP,_both_of_them_go_in_the_course_of_four-step_authentication_progression_which_is_called______________$ |
A. | AP-handshaking |
B. | 4-way handshake |
C. | 4-way connection |
D. | wireless handshaking |
Answer» C. 4-way connection | |
7. |
___________________ began to show up few years back on wireless access points as a new way of adding or connecting new devices. |
A. | WPA2 |
B. | WPA |
C. | WPS |
D. | WEP |
Answer» D. WEP | |
8. |
Which of the following is a Wireless traffic Sniffing tool? |
A. | Maltego |
B. | BurpSuit |
C. | Nessus |
D. | Wireshark |
Answer» E. | |
9. |
___________ is a process of wireless traffic analysis that may be helpful for forensic investigations or during troubleshooting any wireless issue. |
A. | Wireless Traffic Sniffing |
B. | WiFi Traffic Sniffing |
C. | Wireless Traffic Checking |
D. | Wireless Transmission Sniffing |
Answer» B. WiFi Traffic Sniffing | |
10. |
It is recommended to use WPA2 or WPA3 encryption standard as they are strong and more secure. |
A. | True |
B. | False |
Answer» B. False | |
11. |
BTS stands for __________________? |
A. | Basement Transceiver Server |
B. | Base Transmitter Station |
C. | Base Transceiver Server |
D. | Base Transceiver Station |
Answer» E. | |
12. |
___________________ is alike as that of Access Point (AP) from 802.11, & the mobile operators uses it for offering signal coverage. |
A. | Base Signal Station |
B. | Base Transmitter Station |
C. | Base Transceiver Station |
D. | Transceiver Station |
Answer» D. Transceiver Station | |
13. |
AP is abbreviated as _____________ |
A. | Access Point |
B. | Access Port |
C. | Access Position |
D. | Accessing Port |
Answer» B. Access Port | |
14. |
_______________ is the central node of 802.11 wireless operations. |
A. | WPA |
B. | Access Point |
C. | WAP |
D. | Access Port |
Answer» C. WAP | |
15. |
_________ is an old IEEE 802.11 standard from the year 1999. |
A. | WPA2 |
B. | WPA3 |
C. | WEP |
D. | WPA |
Answer» D. WPA | |
16. |
Which among the following is the least strong security encryption standard? |
A. | WEP |
B. | WPA |
C. | WPA2 |
D. | WPA3 |
Answer» B. WPA | |
17. |
Which among them has the strongest wireless security? |
A. | WEP |
B. | WPA |
C. | WPA2 |
D. | WPA3 |
Answer» E. | |
18. |
____________________ is the anticipation of unauthorized access or break to computers or data by means of wireless networks. |
A. | Wireless access |
B. | Wireless security |
C. | Wired Security |
D. | Wired device apps |
Answer» C. Wired Security | |