Network Security Questions and Answers – Wireless Security

This set of Network Security online test focuses on “Wireless Security”.

1. Wi-Fi stands for-
a) Wireless Fidelity
b) Wireless LAN
c) Wireless FLAN
d) None of the mentioned
View Answer

Answer: a
Explanation: Wi-Fi stands for Wireless Fidelity.

2. Wired networks are far more susceptible to eavesdropping and jamming than wireless networks.
a) True
b) False
View Answer

Answer: b
Explanation: The converse is true.

3. “A user intending to connect to one LAN may unintentionally lock onto a wireless access point from the neighboring network.” Which type of Wireless network threat would you classify this under?
a) Malicious Threat
b) Network Injection
c) Denial Of Service
d) Accidental Association
View Answer

Answer: d
Explanation: This threat falls under Accidental Association.
advertisement
advertisement

4. “When there is a lack of a central point of control.” Which type of Wireless network threat would you classify this under?
a) Man in the middle attack
b) Identity Theft
c) Ad Hoc Networks
d) Non-Traditional Networks
View Answer

Answer: c
Explanation: This threat falls under Ad Hoc networks.

5. “When fraud access points are created to access information such as passwords.” Which type of Wireless network threat would you classify this under?
a) Identity Theft
b) Network Injection
c) Man in the middle attack
d) Malicious Association
View Answer

Answer: d
Explanation: This threat falls under Malicious Association.

6. “When bogus reconfiguration commands are used to affect routers and switches to degrade network performance.” Which type of Wireless network threat would you classify this under?
a) Network Injection
b) Malicious Association
c) Man in the middle attack
d) Denial Of Service
View Answer

Answer: a
Explanation: This threat falls under Network Injection.

7. “When communication is unknowingly going through an adversary/intermediate.” Which type of Wireless network threat would you classify this under?
a) Malicious Association
b) Man in the middle attack
c) Network Injection
d) Accidental Association
View Answer

Answer: b
Explanation: This threat falls under Man in the middle attack.
advertisement

8. “When an attacker is able to eavesdrop on network traffic and identify the MAC address of a computer with network previleges.” Which type of Wireless network threat would you classify this under?
a) Identity Theft.
b) Man in the middle attack
c) Network Injection
d) Accidental Association
View Answer

Answer: a
Explanation: This threat falls under Identity Theft.

9. SSID stands for –
a) Secure Service Identifier
b) Secure Set Independent Device
c) Secure Set Identifier
d) Service Set Independent Device
View Answer

Answer: c
Explanation: SSID stands for Secure Set Identifier.
advertisement

10. Which of these is not a valid Signal-Hiding Technique for Wireless networks?
a) reducing the signal strength to the lowest level such that it still provides requisite coverage
b) using directional antennas and signal shielding techniques
c) installing the wireless access point away from exteriors of the building
d) none of the mentioned
View Answer

Answer: d
Explanation: All of the mentioned are valid signal hiding techniques.

11. Mobile Device security falls under 3 categories. Which of these is not a valid Mobile Device security category?
a) Barrier security
b) Traffic security
c) Device security
d) All of the above
View Answer

Answer: d
Explanation: Mobile Device security falls under 3 categories which are – Barrier security, Device security and Traffic security.

12. “Installation of third party applications are prohibited on many company hardware devices such as laptops, mobiles, etc.” Which Mobile Device security category of implementation does this fall under?
a) Barrier security
b) Traffic security
c) Device security
d) None of the mentioned
View Answer

Answer: c
Explanation: This falls under Device Security.

13. VPN stands for –
a) Visual Performance Node
b) Virtual Private Network
c) Virtual Post Node
d) Virtual Post Network
View Answer

Answer: b
Explanation: VPN stands for Virtual Private Network.

14. Another name for the Wireless Ethernet 802.11a is-
a) Wi-Fi
b) Wi-Fi4
c) Wi-Fi5
d) Wi-Fi6
View Answer

Answer: c
Explanation: Another name for the Wireless Ethernet 802.11b is Wi-Fi5.

15. WPA stands for –
a) Wired Protected Access
b) Wireless Protected Access
c) Wireless Personal Access
d) Wired Personal Access
View Answer

Answer: b
Explanation: WPA stands for Wireless Protected Access.

Sanfoundry Global Education & Learning Series – Cryptography and Network Security.

To practice all areas of Network Security for online test, here is complete set of 1000+ Multiple Choice Questions and Answers.

If you find a mistake in question / option / answer, kindly take a screenshot and email to [email protected]

advertisement
advertisement
Subscribe to our Newsletters (Subject-wise). Participate in the Sanfoundry Certification contest to get free Certificate of Merit. Join our social networks below and stay updated with latest contests, videos, internships and jobs!

Youtube | Telegram | LinkedIn | Instagram | Facebook | Twitter | Pinterest
Manish Bhojasia - Founder & CTO at Sanfoundry
Manish Bhojasia, a technology veteran with 20+ years @ Cisco & Wipro, is Founder and CTO at Sanfoundry. He lives in Bangalore, and focuses on development of Linux Kernel, SAN Technologies, Advanced C, Data Structures & Alogrithms. Stay connected with him at LinkedIn.

Subscribe to his free Masterclasses at Youtube & discussions at Telegram SanfoundryClasses.