Tip

Tap
a student's name
below to see what they need help with
Quizalize logo
placeholder image to represent content

Advanced Cybersecurity - Security + Domain 1 Lesson 8 - Wireless and Layer 2 Attacks

Quiz by Jones, Tiffany N

Feel free to use or edit the questions

includes Teacher and Student dashboards

Measure skills
from any curriculum

Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.

Q 1/45
Score 0
Which of the following wireless attacks involves an attacker setting up a malicious wireless access point in order to intercept network traffic?
30
Denial of Service
Evil Twin
Phishing
Brute Force

45 questions

Q.Which of the following wireless attacks involves an attacker setting up a malicious wireless access point in order to intercept network traffic?
1
30 sec
Q.What type of wireless attack involves forcing a wireless device to reconnect to a malicious network by sending de-authentication packets?
2
30 sec
Q.What is the term for a wireless attack where an attacker floods a wireless network with unnecessary or malicious traffic, causing it to become unavailable to legitimate users?
3
30 sec
Q.Which Layer 2 attack involves flooding the network with gratuitous Address Resolution Protocol (ARP) messages?
4
30 sec
Q.Which Layer 2 attack aims to exhaust the available MAC address table entries on a switch?
5
30 sec
Q.Which of the following is an example of a Layer 2 attack?
6
30 sec
Q.What is a common Layer 2 attack that involves impersonating a legitimate network device?
7
30 sec
Q.Which Layer 2 attack involves manipulating the source Media Access Control (MAC) address when sending frames?
8
30 sec
Q.Which Layer 2 attack involves sending Address Resolution Protocol (ARP) requests for an IP address already associated with another device in the network?
9
30 sec
Q.What wireless attack involves intercepting and altering communication between two parties without their knowledge?
10
30 sec
Q.How does a rogue access point deceive users?
11
30 sec
Q.How can a rogue access point be defined?
12
30 sec
Q.What is Bluesnarfing?
13
30 sec
Q.How can Bluesnarfing be prevented?
14
30 sec
Q.What is the primary objective of Bluesnarfing?
15
30 sec
Q.What is bluejacking?
16
30 sec
Q.What is a common method used for bluejacking?
17
30 sec
Q.How can bluejacking be prevented?
18
30 sec
Q.What does RFID stand for?
19
30 sec
Q.What is an RFID wireless attack?
20
30 sec
Q.How does an RFID wireless attack work?
21
30 sec
Q.What is RFID skimming?
22
30 sec
Q.What is RFID spoofing?
23
30 sec
Q.Which of the following is a wireless attack that targets NFC technology?
24
30 sec
Q.What is an IV wireless attack?
25
30 sec
Q.What is an example of an IV wireless attack?
26
30 sec
Q.Which encryption protocol is vulnerable to IV collisions?
27
30 sec
Q.What is the purpose of a keylogger in Man in the browser attacks?
28
30 sec
Q.How can users protect themselves against Man in the browser attacks?
29
30 sec
Q.What is the method used by Man in the browser malware to inject itself into web browsers?
30
30 sec
Q.What is the purpose of web injections in Man in the browser attacks?
31
30 sec
Q.What is Man in the browser?
32
30 sec
Q.What does Man in the browser allow attackers to do?
33
30 sec
Q.What is ARP Poisoning?
34
30 sec
Q.What is the purpose of ARP Poisoning?
35
30 sec
Q.How does ARP Poisoning work?
36
30 sec
Q.What is the purpose of ARP?
37
30 sec
Q.What is MAC flooding?
38
30 sec
Q.What is the purpose of MAC flooding?
39
30 sec
Q.What is the potential impact of MAC flooding?
40
30 sec
Q.How does MAC flooding work?
41
30 sec
Q.How can MAC flooding be prevented?
42
30 sec
Q.What is MAC cloning?
43
30 sec
Q.What is the purpose of MAC cloning?
44
30 sec
Q.Why would someone use MAC cloning?
45
30 sec

Give this quiz to my class