Which abbreviation stands for Wired Equivalent Privacy, introduced in 1997 but quickly found insecure due to weak RC4 encryption?, A. WPA, B. WEP, C. WPA2, D. WPS, What was released in 2003 as a temporary fix for WEP, using TKIP encryption but still vulnerable?, A. WPA, B. WPA2, C. WPA3, D. WPS, Which Wi-Fi security protocol, introduced in 2004, implemented AES encryption and became the industry standard for over a decade?, A. WEP, B. WPA, C. WPA2, D. WPS, Released in 2018, which protocol added stronger cryptography, protection against brute-force attacks, and better security for public networks?, A. WPA3, B. WPA2, C. WEP, D. WPS, Which abbreviation refers to a method designed to simplify connecting devices via PIN or push button, but is insecure because the PIN can be brute-forced?, A. WPA, B. WEP, C. WPA3, D. WPS, Which of the following best describes a Brute Force Attack?, A. Attackers exploit software bugs to gain unauthorized access., B. Attackers try countless combinations or common words until they guess the password., C. Attackers trick users into revealing credentials through fake websites., D. Attackers intercept data during transmission to steal information., Which best practice helps prevent malicious code from sneaking into websites through forms?, A. Strong Authentication, B. Input Validation, C. Regular Patching, D. Security Awareness, What practice involves using unique, complex passwords and enabling two-factor authentication (2FA)?, A. Input Validation, B. Strong Authentication, C. Security Awareness, D. Regular Patching, Why is Regular Patching important for cybersecurity?, A. It prevents phishing emails from reaching users., B. It ensures websites check user input., C. It keeps software updated with critical security fixes., D. It enforces strong password rules., Which best practice emphasizes staying informed about phishing emails and suspicious links?, A. Input Validation, B. Strong Authentication, C. Security Awareness, D. Regular Patching, Which combination of practices builds a strong defense against cyber threats?, A. Input Validation, Strong Authentication, Regular Patching, Security Awareness, B. Only Strong Authentication and Security Awareness, C. Input Validation and Regular Patching only, D. None of the above, Which web attack involves inserting malicious SQL statements into a query to manipulate a database?, A. Cross-Site Scripting (XSS), B. SQL Injection, C. Phishing, D. Brute Force Attack, What is the main goal of a SQL Injection attack?, A. To trick users into clicking fake links, B. To gain unauthorized access or manipulate database information, C. To overload a server with traffic, D. To guess passwords through repeated attempts, Which Wi-Fi security protocol uses 40-bit encryption and is considered easily hackable?, A. WPA, B. WEP, C. WPA2, D. WPA3, What does the abbreviation AES stand for?, A. Advanced Encryption Standard, B. Automatic Encryption System, C. Applied Electronic Security, D. Algorithmic Encoding Scheme.
0%
Wireless & Web Security
Teilen
Teilen
Teilen
von
Cgcangelamalaba
Inhalt bearbeiten
Drucken
Einbetten
Mehr
Zuweisungen
Bestenliste
Mehr anzeigen
Weniger anzeigen
Diese Bestenliste ist derzeit privat. Klicke auf
Teilen
um sie öffentlich zu machen.
Diese Bestenliste wurde vom Eigentümer der Ressource deaktiviert.
Diese Bestenliste ist deaktiviert, da sich Ihre Einstellungen von denen des Eigentümer der Ressource unterscheiden.
Einstellungen zurücksetzen
Quiz
ist eine Vorlage mit offenem Ende. Es generiert keine Punkte für eine Bestenliste.
Anmelden erforderlich
Visueller Stil
Schriftarten
Abonnement erforderlich
Einstellungen
Vorlage ändern
Alle anzeigen
Weitere Formate werden angezeigt, wenn du die Aktivität spielst.
)
Offene Ergebnisse
Link kopieren
QR-Code
Löschen
Soll die automatisch gespeicherte Aktivität
wiederhergestellt werden?