Question 1: Which standard is Wi-Fi based on?
- IEEE 802.11
- ISO 5750
- 5-4-3 rule
- 10Base-T
Question 2: When the Ethernet switch was introduced, what major benefit did it bring to networks?
- It allowed simultaneous transmissions on a network.
- It increased the number of computers that can be connected to a network.
- It reduced the number of transmission collisions that occur on a wired network.
- It enabled the connection of wireless clients.
Question 3: The current best level of security provided for Wi-Fi networks is WPA3. Which other Wi-Fi security protocol is also commonly recommended?
- WPA4
- WPA
- WEP
- WPA2
Question 4: In what year did the rise of the first wireless local access network occur?
- 1991
- 1988
- 1997
- 1985
Question 5: What does WPA stand for?
- Wireless proliferation algorithm
- Wi-Fi protected access
- Wi-Fi performance attributes
- Wireless provisioning agency
Question 6: Why is wireless security necessary?
- To prevent eavesdropping by bad actors
- To enable bandwidth modulation
- To enable secure payment methods for accessing Wi-Fi hot spots
- To enable monitoring of the Internet connection for viruses, malware, and hacking attempts
Question 7: Which change that was introduced in Wi-Fi Protected Access 2 (WPA2) strengthened encrypted Wi-Fi communications?
Select one:
- Enforcement of stronger passphrases
- Hardware Security Modules (HSM)
- Encryption digital certificate
- Advanced Encryption Standard (AES) algorithm*
Question 8: Which two security practices make your home wireless network safer? (Choose two.)
Select one or more:
- Keep your router firmware up to date.*
- Pick passphrases that are hard to guess.*
- Install antivirus software on all Wi-Fi devices.
- Consult with NIST as to the latest security strategies.
Question 9: Which two features of Wi-Fi Protected Access 3 (WPA3) strengthened security? (Choose two.)
Select one or more:
- Digital signatures were introduced to help identify valid access points (APs).
- The encryption key size was lengthened.*
- Complex passphrases were enforced.
- The handshake for establishing connections became more secure.*
Question 10: What is Wi-Fi?
Select one:
- Fiber that makes wireless technology possible
- An Ethernet networking protocol
- Quality audio technology
- Technology for radio wireless local area networks*
Question 11: What weakness of Wired Equivalent Privacy (WEP) made it unsuitable to secure Wi-Fi communications?
Select one:
- The RC4 encryption algorithm was easily defeated.*
- It did not enforce complex passwords.
- It was susceptible to man-in-middle attacks.
- It did not support digital signatures.