www.howtonetwork.org

CCNA & CCNP Certifcation Training

  • About
  • Contact
  • FAQ
  • Join
  • Home
  • CCNA
    • ICND1
    • ICND2
    • 101 CCNA LABS
  • CCNP
    • ROUTE
    • SWITCH
    • TSHOOT
    • 101 CCNP LABS
  • CompTIA
    • Security+
    • Network+
  • Design
    • CCDA
    • CCDP
You are here: Home / CompTIA / Network+ / Section V: Network Security / Chapter 30: Common Threats and Vulnerabilities / Chapter 30 Quiz

Chapter 30 Quiz

1. Which of the following Wi-Fi encryption protocols is vulnerable to possible attacks?

a. WPA

b. WPA2

c. ARP

d. WEP

e. SSH

 

2. Spoofing attacks can also be referred to as masquerading (true or false).

a. True

b. False

 

3. What is the most effective countermeasure against password cracking attacks?

a. Not using passwords

b. Using numbers in the password field

c. Encrypting the password using DE

d. Using strong encryption algorithms, like AES

e. Using a birthday as the password value

 

4. What is the name of the network attack in which the attacker . . .

The content below this message is for members only.

About Us

This is a free bonus site for members of www.howtonetwork.com

Copyright

The content on this copyright Reality Press Ltd.
Copyright Reality Press Ltd.