Which abbreviation stands for Wired Equivalent Privacy, introduced in 1997 but quickly found insecure due to weak RC4 encryption?, A. WPA, B. WEP, C. WPA2, D. WPS, What was released in 2003 as a temporary fix for WEP, using TKIP encryption but still vulnerable?, A. WPA, B. WPA2, C. WPA3, D. WPS, Which Wi-Fi security protocol, introduced in 2004, implemented AES encryption and became the industry standard for over a decade?, A. WEP, B. WPA, C. WPA2, D. WPS, Released in 2018, which protocol added stronger cryptography, protection against brute-force attacks, and better security for public networks?, A. WPA3, B. WPA2, C. WEP, D. WPS, Which abbreviation refers to a method designed to simplify connecting devices via PIN or push button, but is insecure because the PIN can be brute-forced?, A. WPA, B. WEP, C. WPA3, D. WPS, Which of the following best describes a Brute Force Attack?, A. Attackers exploit software bugs to gain unauthorized access., B. Attackers try countless combinations or common words until they guess the password., C. Attackers trick users into revealing credentials through fake websites., D. Attackers intercept data during transmission to steal information., Which best practice helps prevent malicious code from sneaking into websites through forms?, A. Strong Authentication, B. Input Validation, C. Regular Patching, D. Security Awareness, What practice involves using unique, complex passwords and enabling two-factor authentication (2FA)?, A. Input Validation, B. Strong Authentication, C. Security Awareness, D. Regular Patching, Why is Regular Patching important for cybersecurity?, A. It prevents phishing emails from reaching users., B. It ensures websites check user input., C. It keeps software updated with critical security fixes., D. It enforces strong password rules., Which best practice emphasizes staying informed about phishing emails and suspicious links?, A. Input Validation, B. Strong Authentication, C. Security Awareness, D. Regular Patching, Which combination of practices builds a strong defense against cyber threats?, A. Input Validation, Strong Authentication, Regular Patching, Security Awareness, B. Only Strong Authentication and Security Awareness, C. Input Validation and Regular Patching only, D. None of the above, Which web attack involves inserting malicious SQL statements into a query to manipulate a database?, A. Cross-Site Scripting (XSS), B. SQL Injection, C. Phishing, D. Brute Force Attack, What is the main goal of a SQL Injection attack?, A. To trick users into clicking fake links, B. To gain unauthorized access or manipulate database information, C. To overload a server with traffic, D. To guess passwords through repeated attempts, Which Wi-Fi security protocol uses 40-bit encryption and is considered easily hackable?, A. WPA, B. WEP, C. WPA2, D. WPA3, What does the abbreviation AES stand for?, A. Advanced Encryption Standard, B. Automatic Encryption System, C. Applied Electronic Security, D. Algorithmic Encoding Scheme.
0%
Wireless & Web Security
Bendrinti
Bendrinti
Bendrinti
prie
Cgcangelamalaba
Redaguoti turinį
Spausdinti
Įterpti
Daugiau
Užduotis
Lyderių lentelė
Rodyti daugiau
Rodyti mažiau
Ši lyderių lentelė šiuo metu yra privati. Spustelėkite
Bendrinti
, kad ji būtų vieša.
Ši lyderių lentelė buvo išjungta išteklių savininko.
Ši lyderių lentelė yra išjungta, nes jūsų parinktys skiriasi nuo nustatytų išteklių savininko.
Grąžinti parinktis
Viktorina
yra neterminuotas šablonas. Jis negeneruoja rezultatų lyedrių lentelei.
Reikia prisijungti
Vizualinis stilius
Šriftai
Būtina prenumerata
Parinktys
Pakeisti šabloną
Rodyti viską
Pradėjus veiklą bus rodoma daugiau formatų.
)
Atviri rezultatai
Kopijuoti nuorodą
QR kodas
Naikinti
Atkurti automatiškai įrašytą:
?