Skip survey header

Security+ Practice Quiz: SY0-501 Quiz 30

Enjoy the following 10 question quiz from TestOut.

1. Which of the following specifications identify security that can be added to wireless networks? (Choose two)
2. Which of the following wireless security methods uses a common shared key configured on the wireless access point and all wireless clients?
3. Which of the following offers the WEAKEST form of encryption for an 802.11 wireless network?

4. What encryption method is used by WPA for wireless networks?

5. Which of the following features on a wireless network allows or rejects client connections based on the hardware address?
6. A customer has called and indicated that he thinks his neighbor is connecting to his wireless access point (AP) to use his high-speed internet connection. Which of the following will resolve this issue? (Choose two)
7. You've just finished installing a wireless access point for a client. What should you do to prevent unauthorized users from using the access point (AP) configuration utility?
8. You notice that over the last few months more and more static systems, such as the office environment control system, the security system, and lighting controls, are connecting to your network. You know that these devices can be a security threat.

Which of the following measures can you take to minimize the damage these devices can cause if they are compromised?
9. Your network devices are categorized into the following zone types:

No-trust zone
Low-trust zone
Medium-trust zone
High-trust zone

Your network architecture employs multiple VLANs for each of these network zones. Each zone is separated by a firewall that ensures only specific traffic is allowed.

Which of the following is the secure architecture concept that is being used on this network?
10. Your organization has started receiving phishing e-mails. You suspect that an attacker is attempting to find an employee workstation they can compromise. You know that a workstation can be used as a pivot point to gain access to more sensitive systems.

Which of the following is the most important aspect of maintaining network security against this type of attack?
This free quiz was provided by: