CWNA Chapter 13

40 Questions | Attempts: 184
Share
Please wait...
Question 1 / 40
0 %
0/100
Score 0/100
1. Every network card has a physical address known as a?
Submit
Please wait...
About This Quiz
CWNA Quizzes & Trivia

Tell us your name to personalize your report, certificate & get on the leaderboard!
2. A stand-alone access point would be the authenticator, would be a manager switch, and the authentication server would typically be a _____ Server.
Submit
3. What is an algorithm used to perform encryption?
Submit
4. What technology can provide the necessary level of security for remote access when end users connect to public access WLANS.
Submit
5. Effectively turns a web browser into an authentication device.
Submit
6. Equipment usually can be configured through a CLI or a web interface or via?
Submit
7. What is the verification of user identity and credentials?
Submit
8. What involves granting access to network resources and services?
Submit
9. An optional method for robust security networks that uses the RC4 cipher just as WEP encryption does?
Submit
10. An approach to restricting system aces to authorized users?
Submit
11. The method that uses the CCMP also uses what encryption algorithm?
Submit
12. A server that validates the credential of the supplicant that is requesting access and notifies the authenticator that the supplicant had been authorized. 
Submit
13. The default encryption code defined under the 802.11i amendment is known as what?
Submit
14. The term cloaking is used to describe hiding your what?
Submit
15. One of the two major types of layer 3 VPN technologies?
Submit
16. What is tracking the use of network resources by users called?
Submit
17. A common use of this technology is to provide site-to-site connectivity between a remote office and corporate office
Submit
18. What security method separates user traffic within a network?
Submit
19. This could either be a PSK or AEP protocol used during 802.1X authentication.
Submit
20. What can be defined through use of mac filters, ACLs, and firewall rules?
Submit
21. A data integrated checksum known as what is computed on data before encryption?
Submit
22. A host with software that is requiring authentication and access to network resources.
Submit
23. What utilizes a dynamic encryption-key management method that involves the creation of 5 separate keys.
Submit
24. IPSec supports what ciphers?
Submit
25. A device that blocks or allows traffic to pass through it's port entry.
Submit
26. This is to maintain a user data base or may proxy with an external LDAP database to authenticate user credentials.
Submit
27. What is normally an open network that has no WPA/WPA2 encryption and is an open network?
Submit
28. Many organizations provide what guest access with a unique SSID and a user VLAN
Submit
29. What term describes the primary goal to provide data privacy by encrypting the data before transmission?
Submit
30. Point-to-Point Tunneling uses what for user authentication?
Submit
31. One of the two major types of layer 3 VPN technologies?
Submit
32. What algorithm is used in technologies that are often used to protect Internet traffic, such as SSL?
Submit
33. What encryption algorithm uses a method known as Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
Submit
34. This security method can be achieved through the use of firewalls, routers, VPNs, and VLANs.
Submit
35. Guest traffic is usually segmented from corporate user traffic in a unique way tied to a unique guest subnet.
Submit
36. What is often a requirement of many industry regulations such as the payment card industry (PCI)?
Submit
37. What is a layer 2 encryption method that uses RC4 streaming cipher?
Submit
38. What is a layer 2 authentication protocol used to provide user authentication?
Submit
39. TKIP uses a stronger data integrity check known as what to migrate known bit-flipping attacks against WEP?
Submit
40. What is used to create spare broadcast domains in a layer 2 network and are often used to restrict access to network resources without regard to physical topology of the network.
Submit
View My Results

Quiz Review Timeline (Updated): Mar 14, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 17, 2013
    Quiz Created by
    KillaCadillack
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Every network card has a physical address known as a?
A stand-alone access point would be the authenticator, would be a...
What is an algorithm used to perform encryption?
What technology can provide the necessary level of security for remote...
Effectively turns a web browser into an authentication device.
Equipment usually can be configured through a CLI or a web interface...
What is the verification of user identity and credentials?
What involves granting access to network resources and services?
An optional method for robust security networks that uses the RC4...
An approach to restricting system aces to authorized users?
The method that uses the CCMP also uses what encryption algorithm?
A server that validates the credential of the supplicant that is...
The default encryption code defined under the 802.11i amendment is...
The term cloaking is used to describe hiding your what?
One of the two major types of layer 3 VPN technologies?
What is tracking the use of network resources by users called?
A common use of this technology is to provide site-to-site...
What security method separates user traffic within a network?
This could either be a PSK or AEP protocol used during 802.1X...
What can be defined through use of mac filters, ACLs, and firewall...
A data integrated checksum known as what is computed on data before...
A host with software that is requiring authentication and access to...
What utilizes a dynamic encryption-key management method that involves...
IPSec supports what ciphers?
A device that blocks or allows traffic to pass through it's port...
This is to maintain a user data base or may proxy with an external...
What is normally an open network that has no WPA/WPA2 encryption and...
Many organizations provide what guest access with a unique SSID and a...
What term describes the primary goal to provide data privacy by...
Point-to-Point Tunneling uses what for user authentication?
One of the two major types of layer 3 VPN technologies?
What algorithm is used in technologies that are often used to protect...
What encryption algorithm uses a method known as Counter Mode with...
This security method can be achieved through the use of firewalls,...
Guest traffic is usually segmented from corporate user traffic in a...
What is often a requirement of many industry regulations such as the...
What is a layer 2 encryption method that uses RC4 streaming cipher?
What is a layer 2 authentication protocol used to provide user...
TKIP uses a stronger data integrity check known as what to migrate...
What is used to create spare broadcast domains in a layer 2 network...
Alert!

Advertisement