1) What encryption standard is used with WPA2 for strong wireless security? a) TKIP b) WEP c) AES d) SSH 2) Which wireless security protocol offers the most modern and secure encryption features? a) WPA b) WPA2 c) WPA3 d) WEP 3) What is the purpose of TKIP in wireless networks? a) Replaces WPA3 b) Provides strong encryption using AES c) Offers backward compatibility for WPA d) Encrypts physical hard drives 4) Which of the following is an outdated and insecure protocol? a) WPA3 b) WPA2 c) TKIP d) WEP 5) AES is best described as: a) A remote access tool b) An old encryption method replaced by TKIP c) A strong encryption method used in WPA2 and WPA3 d) A user login protocol 6) What is the role of RADIUS in a network? a) Encrypting emails b) Storing biometric data c) Centralized authentication for network access d) Connecting USB devices securely 7) TACACS+ is mainly used for: a) Logging into Facebook b) Encrypting wireless networks c) Authentication and authorization of network device access d) Setting up wireless access points 8) Which protocol uses “tickets” to allow users to access resources securely after authentication? a) TACACS+ b) Kerberos c) RADIUS d) SSH 9) Which authentication protocol is primarily used in enterprise environments for SSO (Single Sign-On)? a) WPA3 b) Kerberos c) AES d) WEP 10) Which of the following is NOT a multifactor authentication method? a) Password + fingerprint b) PIN + retina scan c) Password + smart card d) Username + password 11) Why is WPA3 considered more secure than WPA2? a) It uses TKIP instead of AES b) It allows open networks to skip encryption c) It supports forward secrecy and stronger encryption d) It requires no password for access 12) A company is upgrading from WPA to a newer, more secure protocol without replacing all devices. Which option is best? a) WPA3 b) WPA2 c) WEP d) SSH 13) Which wireless encryption method was originally introduced with WPA but later replaced due to weak security? a) AES b) TKIP c) WPA3 d) Kerberos 14) Which of the following should NOT be used in a modern secure wireless network? a) WPA2 with AES b) WPA3 c) TKIP d) WPA2 Enterprise 15) Which protocol provides centralized authentication, authorization, and accounting (AAA) services over UDP? a) TACACS+ b) Kerberos c) RADIUS d) SSO 16) Which protocol is more commonly used by network administrators for device-level access (e.g., routers, switches)? a) RADIUS b) TACACS+ c) WPA3 d) AES 17) Which authentication protocol uses tickets and timestamps to prevent replay attacks? a) TACACS+ b) RADIUS c) Kerberos d) SSL 18) A company wants to implement login security that requires both a password and a smart card. What are they using? a) Single Sign-On b) Two-Factor Authentication c) Multifactor Authentication d) Active Directory 19) What is a key weakness of relying only on username and password authentication? a) It encrypts too much data b) It is too expensive c) It can be easily guessed or stolen d) It requires tickets to access files
0%
2.2: Wireless Security Protocols & Authentication
공유
공유
공유
만든이
Twoods202324
9th Grade
10th Grade
11th Grade
12th Grade
Higher Education
Adults
콘텐츠 편집
인쇄
퍼가기
더보기
할당
순위표
더 보기
접기
이 순위표는 현재 비공개입니다.
공유
를 클릭하여 공개할 수 있습니다.
자료 소유자가 이 순위표를 비활성화했습니다.
옵션이 자료 소유자와 다르기 때문에 이 순위표가 비활성화됩니다.
옵션 되돌리기
퀴즈
(은)는 개방형 템플릿입니다. 순위표에 올라가는 점수를 산출하지 않습니다.
로그인이 필요합니다
비주얼 스타일
글꼴
구독 필요
옵션
템플릿 전환하기
모두 표시
액티비티를 플레이할 때 더 많은 포맷이 나타납니다.
결과 열기
링크 복사
QR 코드
삭제
자동 저장된
게임을 복구할까요?