#1
Which of the following is a security protocol commonly used in wireless networks?
WEP
ExplanationWEP (Wired Equivalent Privacy) is an older security protocol used in wireless networks, though it's now considered relatively insecure due to vulnerabilities.
#2
What does SSID stand for in the context of wireless networking?
Service Set Identifier
ExplanationSSID (Service Set Identifier) is a unique identifier that enables wireless devices to connect to a specific network.
#3
Which of the following wireless network standards operates at the 5 GHz frequency band?
802.11a
Explanation802.11a is a wireless network standard that operates at the 5 GHz frequency band, offering higher data rates but shorter range compared to 2.4 GHz standards.
#4
What is the purpose of MAC filtering in wireless network security?
To restrict access based on device MAC addresses
ExplanationMAC filtering limits access to a wireless network based on the unique MAC addresses of individual devices, providing an additional layer of security.
#5
What is the main purpose of a VPN (Virtual Private Network) in the context of wireless network security?
To encrypt data transmissions between devices
ExplanationA VPN (Virtual Private Network) encrypts data transmissions between devices, ensuring privacy and security over wireless networks, especially over public Wi-Fi connections.
#6
Which encryption algorithm is considered the most secure for protecting wireless network communications?
WPA3
ExplanationWPA3 (Wi-Fi Protected Access 3) is the latest and most secure encryption protocol for wireless networks, offering enhanced security features over its predecessors.
#7
What is the main purpose of a wireless access point (WAP) in a network?
To provide a centralized connection point for wireless devices
ExplanationA wireless access point (WAP) serves as a central hub that enables wireless devices to connect to a wired network.
#8
Which authentication method requires users to provide both a password and a unique code generated by a mobile device or token?
Two-factor authentication (2FA)
ExplanationTwo-factor authentication (2FA) requires users to provide two different authentication factors: something they know (password) and something they have (e.g., a mobile device or token).
#9
What does EAP stand for in the context of wireless network security?
Extensible Authentication Protocol
ExplanationEAP (Extensible Authentication Protocol) is an authentication framework often used in wireless networks, offering various methods for secure authentication.
#10
What does the term 'Rogue Access Point' refer to in wireless network security?
An unauthorized access point added to the network by an attacker
ExplanationA Rogue Access Point is an unauthorized access point added to a network by an attacker, potentially leading to security breaches and data compromise.
#11
Which of the following is a potential security threat in wireless networks where an attacker intercepts and reads data being transmitted between two parties?
Man-in-the-Middle (MitM) attack
ExplanationA Man-in-the-Middle (MitM) attack occurs when an attacker intercepts and potentially alters communications between two parties without their knowledge.
#12
Which of the following is a technique used to extend the range of a wireless network by using multiple interconnected access points?
Mesh networking
ExplanationMesh networking involves using multiple interconnected access points to extend the coverage and improve the reliability of a wireless network.
#13
Which of the following is a method used to mitigate the risk of eavesdropping in wireless networks?
Encryption
ExplanationEncryption is a method used to encode wireless transmissions, protecting data from being intercepted and understood by unauthorized parties.
#14
Which of the following is a method to prevent unauthorized access to a wireless network by hiding the network's SSID?
SSID cloaking
ExplanationSSID cloaking is a method used to prevent unauthorized access to a wireless network by hiding the network's SSID (Service Set Identifier), making it less visible to potential attackers.
#15
Which wireless encryption method utilizes a passphrase or password for authentication?
WPA-PSK
ExplanationWPA-PSK (Wi-Fi Protected Access Pre-Shared Key) is a wireless encryption method that utilizes a passphrase or password for authentication, providing a simple yet effective security mechanism for wireless networks.