CWNA Chapter 13

40 Questions | Attempts: 184
Share

SettingsSettingsSettings
CWNA Quizzes & Trivia

Questions and Answers
  • 1. 

    What is an algorithm used to perform encryption?

    • A.

      Authorization

    • B.

      Cipher

    • C.

      Authentication

    • D.

      Protocol

    Correct Answer
    B. Cipher
  • 2. 

    What algorithm is used in technologies that are often used to protect Internet traffic, such as SSL?

    • A.

      AES

    • B.

      WEP

    • C.

      RC4 Algorithm

    • D.

      Authentication

    Correct Answer
    C. RC4 Algorithm
  • 3. 

    What encryption algorithm uses a method known as Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

    • A.

      AES

    • B.

      WEP

    • C.

      RC4 Algorithm

    • D.

      Authentication

    Correct Answer
    A. AES
  • 4. 

    What is the verification of user identity and credentials?

    • A.

      Authorization

    • B.

      Authentication

    • C.

      Accounting

    • D.

      Encryption

    Correct Answer
    B. Authentication
  • 5. 

    What involves granting access to network resources and services?

    • A.

      Authorization

    • B.

      Authentication

    • C.

      Accounting

    • D.

      Encryption

    Correct Answer
    A. Authorization
  • 6. 

    What is tracking the use of network resources by users called?

    • A.

      Authorization

    • B.

      Authentication

    • C.

      Accounting

    • D.

      Encryption

    Correct Answer
    C. Accounting
  • 7. 

    What is often a requirement of many industry regulations such as the payment card industry (PCI)?

    • A.

      Authorization

    • B.

      Authentication

    • C.

      Accounting

    • D.

      Encryption

    Correct Answer
    C. Accounting
  • 8. 

    What security method separates user traffic within a network?

    • A.

      Data privacy

    • B.

      AAA

    • C.

      Segmentation

    • D.

      Monitoring and Policy

    Correct Answer
    C. Segmentation
  • 9. 

    This security method can be achieved through the use of firewalls, routers, VPNs, and VLANs.

    • A.

      Data privacy

    • B.

      AAA

    • C.

      Segmentation

    • D.

      Monitoring and Policy

    Correct Answer
    C. Segmentation
  • 10. 

    What is a layer 2 encryption method that uses RC4 streaming cipher?

    • A.

      WPA

    • B.

      WEP

    • C.

      CRC

    • D.

      IV

    Correct Answer
    B. WEP
  • 11. 

    What term describes the primary goal to provide data privacy by encrypting the data before transmission?

    • A.

      Access control

    • B.

      Data integrity

    • C.

      Confidentiality

    • D.

      Open season

    Correct Answer
    C. Confidentiality
  • 12. 

    A data integrated checksum known as what is computed on data before encryption?

    • A.

      ICV

    • B.

      AES

    • C.

      SSL

    • D.

      MSDU

    Correct Answer
    A. ICV
  • 13. 

    Every network card has a physical address known as a?

    • A.

      MAC address

    • B.

      Logical address

    • C.

      IP address

    • D.

      SSID address

    Correct Answer
    A. MAC address
  • 14. 

    The term cloaking is used to describe hiding your what?

    • A.

      SSID

    • B.

      Logical address

    • C.

      IP address

    • D.

      Physical address

    Correct Answer
    A. SSID
  • 15. 

    This could either be a PSK or AEP protocol used during 802.1X authentication.

    • A.

      AKMP

    • B.

      MAC

    • C.

      WLAN

    • D.

      SSID

    Correct Answer
    A. AKMP
  • 16. 

    A host with software that is requiring authentication and access to network resources.

    • A.

      Supplicant

    • B.

      Authenticator

    • C.

      Authentication Server

    • D.

      Authorizer

    Correct Answer
    A. Supplicant
  • 17. 

    A device that blocks or allows traffic to pass through it's port entry.

    • A.

      Supplicant

    • B.

      Authenticator

    • C.

      Authentication server

    • D.

      Authorizer

    Correct Answer
    B. Authenticator
  • 18. 

    A server that validates the credential of the supplicant that is requesting access and notifies the authenticator that the supplicant had been authorized. 

    • A.

      Supplicant

    • B.

      Authenticator

    • C.

      Authentication server

    • D.

      Authorizer

    Correct Answer
    C. Authentication server
  • 19. 

    This is to maintain a user data base or may proxy with an external LDAP database to authenticate user credentials.

    • A.

      Supplicant

    • B.

      Authenticator

    • C.

      Authentication Server

    • D.

      Authorizer

    Correct Answer
    C. Authentication Server
  • 20. 

    A stand-alone access point would be the authenticator, would be a manager switch, and the authentication server would typically be a _____ Server.

    • A.

      RADIUS

    • B.

      Authorizer

    • C.

      SQL

    • D.

      Mainframe

    Correct Answer
    A. RADIUS
  • 21. 

    What is a layer 2 authentication protocol used to provide user authentication?

    • A.

      WLAN

    • B.

      EAP

    • C.

      WEP

    • D.

      WPA/WPA2

    Correct Answer
    B. EAP
  • 22. 

    What utilizes a dynamic encryption-key management method that involves the creation of 5 separate keys.

    • A.

      RSNAs

    • B.

      WEP

    • C.

      EAP

    • D.

      WPA/WPA2

    Correct Answer
    A. RSNAs
  • 23. 

    An optional method for robust security networks that uses the RC4 cipher just as WEP encryption does?

    • A.

      TKIP

    • B.

      PSK

    • C.

      PMK

    • D.

      GTK

    Correct Answer
    A. TKIP
  • 24. 

    TKIP uses a stronger data integrity check known as what to migrate known bit-flipping attacks against WEP?

    • A.

      CCMP

    • B.

      WEP

    • C.

      MIC

    • D.

      PSK

    Correct Answer
    C. MIC
  • 25. 

    The default encryption code defined under the 802.11i amendment is known as what?

    • A.

      CCMP

    • B.

      WEP

    • C.

      MIC

    • D.

      PSK

    Correct Answer
    A. CCMP
  • 26. 

    The method that uses the CCMP also uses what encryption algorithm?

    • A.

      AES

    • B.

      MIC

    • C.

      PSK

    • D.

      WEP

    Correct Answer
    A. AES
  • 27. 

    What is used to create spare broadcast domains in a layer 2 network and are often used to restrict access to network resources without regard to physical topology of the network.

    • A.

      VLAN

    • B.

      WWAN

    • C.

      WAN

    • D.

      WPAN

    Correct Answer
    B. WWAN
  • 28. 

    An approach to restricting system aces to authorized users?

    • A.

      RBAC

    • B.

      WLAN

    • C.

      VLAN

    • D.

      WMAN

    Correct Answer
    A. RBAC
  • 29. 

    What can be defined through use of mac filters, ACLs, and firewall rules?

    • A.

      Permissions

    • B.

      Restrictions

    • C.

      Allowance

    • D.

      Guest

    Correct Answer
    A. Permissions
  • 30. 

    Equipment usually can be configured through a CLI or a web interface or via?

    • A.

      SNMP

    • B.

      AES

    • C.

      RBAC

    • D.

      VLAN

    Correct Answer
    A. SNMP
  • 31. 

    One of the two major types of layer 3 VPN technologies?

    • A.

      PPTP

    • B.

      AES

    • C.

      VLAN

    • D.

      RBAC

    Correct Answer
    A. PPTP
  • 32. 

    One of the two major types of layer 3 VPN technologies?

    • A.

      AES

    • B.

      VLAN

    • C.

      RBAC

    • D.

      IPSec

    Correct Answer
    D. IPSec
  • 33. 

    Point-to-Point Tunneling uses what for user authentication?

    • A.

      MS-CHAP

    • B.

      AES

    • C.

      SSL

    • D.

      DES

    Correct Answer
    A. MS-CHAP
  • 34. 

    IPSec supports what ciphers?

    • A.

      DES

    • B.

      3DES

    • C.

      SSL

    • D.

      All of the above

    Correct Answer
    D. All of the above
  • 35. 

    What technology can provide the necessary level of security for remote access when end users connect to public access WLANS.

    • A.

      VPN

    • B.

      AES

    • C.

      WiFi

    • D.

      HTTP

    Correct Answer
    A. VPN
  • 36. 

    A common use of this technology is to provide site-to-site connectivity between a remote office and corporate office

    • A.

      AES

    • B.

      WiFi

    • C.

      VPN

    • D.

      HTTP

    Correct Answer
    C. VPN
  • 37. 

    What is normally an open network that has no WPA/WPA2 encryption and is an open network?

    • A.

      Guest SSID

    • B.

      Guest VLAN

    • C.

      WiFi

    • D.

      WPAN

    Correct Answer
    A. Guest SSID
  • 38. 

    Many organizations provide what guest access with a unique SSID and a user VLAN

    • A.

      WLAN

    • B.

      VPN

    • C.

      AES

    • D.

      HTTP

    Correct Answer
    A. WLAN
  • 39. 

    Guest traffic is usually segmented from corporate user traffic in a unique way tied to a unique guest subnet.

    • A.

      Guest SSID

    • B.

      Guest VLAN

    • C.

      Guest WiFi

    • D.

      WPAN

    Correct Answer
    B. Guest VLAN
  • 40. 

    Effectively turns a web browser into an authentication device.

    • A.

      Captive portal

    • B.

      DNS

    • C.

      HTTP

    • D.

      SSL

    Correct Answer
    A. Captive portal

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 17, 2013
    Quiz Created by
    KillaCadillack
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.