INTRODUCTION
Malware and its Types
CIA Triad
TYPES OF ATTACKS
Social Engineering
Types of Social Engineering Attacks
Why does Social Engineering works?
Denial of Service
Man In The Middle
Buffer Overflow
Injection attacks
Cross Site Scripting
ARP Poisoning
DNS Poisoning
Privilege Escalation
Amplification Attack
Man In The Browser Attack
Zero Day Attack
Replay Attack
Pass the Hash
Hijacking Attacks
Shimming and Refactoring
MAC and IP spoofing
Wireless Attacks
Cryptographic Attacks Types
Cryptographic Attacks Details
Birthday
Known plain textcipher text
Rainbow tables
Dictionary
Brute force
Collision
downgrade
Replay
Weak Implementations
Threat actor and their types
Penetration Testing
Penetration Testing vs Vulnerability Scanning
Vulnerability Scanning
Vulnerabilities Types & Impacts
Firewall & its Types
VPN Virtual Private Network
NIPS - Network Intrusion Prevention System | NIDS - Network Intrusion Detection System
Router
Switch
Proxy & its Types
Load balancer
Access Point
SIEM Security Information and Event Management
DLP Data Loss Prevention
NAC Network Access Control
Mail Gateway
Advanced Network Technologies Bridge, SSLTLS Accelerators, Decryptors, Media Gateway, HSM
Protocol Analyzer
Network Scanners
Wireless Scanners
Password Crackers
Vulnerability Scanner
Configuration compliance scanner
Exploitation frameworks
Data sanitization tools
Steganography Tools
Honeypot
Backup Utilities
Banner Grabbing
Passive Vs Active
Command Line Tools Ping
Command Line Tools Netstat
Command Line Tools Tracert
Command Line Tools Nslookup & Dig
Command Line Tools Arp
Command Line Tools Ipconfig ip ifconfig
Command Line Tools Tcpdump
Command Line Tools Nmap
Command Line Tools Netcat
Resloving Unencrypted Credentials Clear Text
Resolving Logs And Events Anomalies
Resolving Permission Issues
Resolving Access Violations
Resolving Certificate Issues
Resolving Data Exfiltration
Resolving Misconfigured Devices Firewall, Content Filter, Access Points
Resolving Weak Security Configurations
Resolving Personnel Issues Policy Violation Insider Threat Social Engineering Social Media Personal Email
Resolving Unauthorized Software
Resolving Baseline Deviationv
Resolving License Compliance Violation Availability Integrity
Resolving Asset Management
Resolving Authentication Issues
Analyzing And Interpreting Hids Hips
Analyzing And Interpreting Antivirus
Analyzing And Interpreting File Integrity Check
Analyzing And Interpreting Hostbased Firewall
Analyzing And Interpreting Application Whitelisting
Analyzing And Interpreting Removable Media Control
Analyzing And Interpreting Advanced Malware Tools
Analyzing And Interpreting Patch Management Tools
Analyzing And Interpreting UTM
Analyzing And Interpreting DLP
Analyzing And Interpreting Data Execution Prevention
Analyzing And Interpreting Web Application Firewall
Cellular Connections
WiFi
Satcom
Bluetooth
NFC
ANT
Infrared
USB
Mobile Device Management Concepts
Application Management
Content Management
Remote Wipe
Geofencing Geolocation And Gps Tagging
Asset Tracking And Inventory Control
Screen Locks
Push Notification Services
Passwords And Pins
Biometrics
Context Aware Authentication
Containerization
Storage Segmentation
Full Device Encryption
SHREE LEARNING ACADEMY
Toggle Menu
Home
Tutorial
Quiz
Access Point Quiz
What is the primary difference between home and corporate wireless networks in terms of Access Points?
A) Home networks are less secure
B) Corporate networks use multiple Access Points
C) Home networks use IEEE 802.11ax exclusively
D) Corporate networks don't use Access Points
Which version of the IEEE 802.11 standard is also known as Wi-Fi 6?
A) 802.11a
B) 802.11g
C) 802.11ac
D) 802.11ax
What type of security vulnerability allows a hacker to 'listen in' on your data?
A) MAC Filtering
B) Eavesdropping
C) Infrastructure Mode
D) Ad Hoc Mode
What is the purpose of a Site Survey?
A) To adjust signal strength
B) To choose the correct frequency band
C) To map dead zones and optimize Access Point placement
D) To identify MAC addresses for filtering
What is the main feature of a 'fat' Access Point?
A) Operates only in Ad Hoc Mode
B) Relies on a central controller
C) Has built-in features like security, making it standalone
D) Can only connect to a single device at a time
Submit answers
Your Score:
Go To Website's Tutorial Page
Read Tutorial
Watch our Video Tutorial