Last Updated on October 26, 2019 by Admin
MF -- Wireless LAN Security Quiz
Time limit: 0
Quiz-summary
0 of 9 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
Information
MF — Wireless LAN Security Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 9 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- Answered
- Review
-
Question 1 of 9
1. Question
1 pointsWhat interferer can be seen using the Cisco CleanAir technology?Correct
Incorrect
-
Question 2 of 9
2. Question
1 pointsWhat authentication method would you choose if your guest users need to be greeted with a splash page and login request?Correct
Incorrect
-
Question 3 of 9
3. Question
2 pointsWhat attacks does Management Frame Protection help to mitigate? (Choose 2)
Correct
Incorrect
-
Question 4 of 9
4. Question
1 pointsWhat device is used as the Authentication Server in an 802.1X implementation?Correct
Incorrect
-
Question 5 of 9
5. Question
1 pointsWhen a wireless intrusion prevention system (WIPS) floods a rogue AP with de-authenticate messages, what is the possible reason?Correct
Incorrect
-
Question 6 of 9
6. Question
3 pointsWhich authentication methods are most commonly used in Enterprise wireless deployments? (Choose 3)Correct
Incorrect
-
Question 7 of 9
7. Question
1 pointsWith ___________ scanning a wireless device listens for a beacon frame for a set period of time. Once the device receives a beacon frame and the SSID, it can then attempt to join the network.
Correct
Incorrect
-
Question 8 of 9
8. Question
2 pointsThe two primary security vulnerabilities of the original 802.11 wireless security mechanism areCorrect
Incorrect
-
Question 9 of 9
9. Question
1 pointsThe _____ is an “envelope” that can carry many different kinds of exchange data used for authentication, such as a challenge/response, one-time passwords, and digital certificates.Correct
Incorrect