Which abbreviation stands for Wired Equivalent Privacy, introduced in 1997 but quickly found insecure due to weak RC4 encryption?, A. WPA, B. WEP, C. WPA2, D. WPS, What was released in 2003 as a temporary fix for WEP, using TKIP encryption but still vulnerable?, A. WPA, B. WPA2, C. WPA3, D. WPS, Which Wi-Fi security protocol, introduced in 2004, implemented AES encryption and became the industry standard for over a decade?, A. WEP, B. WPA, C. WPA2, D. WPS, Released in 2018, which protocol added stronger cryptography, protection against brute-force attacks, and better security for public networks?, A. WPA3, B. WPA2, C. WEP, D. WPS, Which abbreviation refers to a method designed to simplify connecting devices via PIN or push button, but is insecure because the PIN can be brute-forced?, A. WPA, B. WEP, C. WPA3, D. WPS, Which of the following best describes a Brute Force Attack?, A. Attackers exploit software bugs to gain unauthorized access., B. Attackers try countless combinations or common words until they guess the password., C. Attackers trick users into revealing credentials through fake websites., D. Attackers intercept data during transmission to steal information., Which best practice helps prevent malicious code from sneaking into websites through forms?, A. Strong Authentication, B. Input Validation, C. Regular Patching, D. Security Awareness, What practice involves using unique, complex passwords and enabling two-factor authentication (2FA)?, A. Input Validation, B. Strong Authentication, C. Security Awareness, D. Regular Patching, Why is Regular Patching important for cybersecurity?, A. It prevents phishing emails from reaching users., B. It ensures websites check user input., C. It keeps software updated with critical security fixes., D. It enforces strong password rules., Which best practice emphasizes staying informed about phishing emails and suspicious links?, A. Input Validation, B. Strong Authentication, C. Security Awareness, D. Regular Patching, Which combination of practices builds a strong defense against cyber threats?, A. Input Validation, Strong Authentication, Regular Patching, Security Awareness, B. Only Strong Authentication and Security Awareness, C. Input Validation and Regular Patching only, D. None of the above, Which web attack involves inserting malicious SQL statements into a query to manipulate a database?, A. Cross-Site Scripting (XSS), B. SQL Injection, C. Phishing, D. Brute Force Attack, What is the main goal of a SQL Injection attack?, A. To trick users into clicking fake links, B. To gain unauthorized access or manipulate database information, C. To overload a server with traffic, D. To guess passwords through repeated attempts, Which Wi-Fi security protocol uses 40-bit encryption and is considered easily hackable?, A. WPA, B. WEP, C. WPA2, D. WPA3, What does the abbreviation AES stand for?, A. Advanced Encryption Standard, B. Automatic Encryption System, C. Applied Electronic Security, D. Algorithmic Encoding Scheme.

Wireless & Web Security

Leaderboard

Visual style

Options

Switch template

)
Continue editing: ?