CWNA Chapter 13

40 Questions | Attempts: 184
Please wait...
Question 1 / 41
🏆 Rank #--
Score 0/100

1. Every network card has a physical address known as a?

Submit
Please wait...
About This Quiz
CWNA Quizzes & Trivia

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. A stand-alone access point would be the authenticator, would be a manager switch, and the authentication server would typically be a _____ Server.

Submit

3. What is an algorithm used to perform encryption?

Submit

4. What technology can provide the necessary level of security for remote access when end users connect to public access WLANS.

Submit

5. Effectively turns a web browser into an authentication device.

Submit

6. Equipment usually can be configured through a CLI or a web interface or via?

Submit

7. What is the verification of user identity and credentials?

Submit

8. What involves granting access to network resources and services?

Submit

9. An optional method for robust security networks that uses the RC4 cipher just as WEP encryption does?

Submit

10. An approach to restricting system aces to authorized users?

Submit

11. The method that uses the CCMP also uses what encryption algorithm?

Submit

12. A server that validates the credential of the supplicant that is requesting access and notifies the authenticator that the supplicant had been authorized. 

Submit

13. The default encryption code defined under the 802.11i amendment is known as what?

Submit

14. The term cloaking is used to describe hiding your what?

Submit

15. One of the two major types of layer 3 VPN technologies?

Submit

16. What is tracking the use of network resources by users called?

Submit

17. A common use of this technology is to provide site-to-site connectivity between a remote office and corporate office

Submit

18. What security method separates user traffic within a network?

Submit

19. This could either be a PSK or AEP protocol used during 802.1X authentication.

Submit

20. What can be defined through use of mac filters, ACLs, and firewall rules?

Submit

21. A data integrated checksum known as what is computed on data before encryption?

Submit

22. A host with software that is requiring authentication and access to network resources.

Submit

23. What utilizes a dynamic encryption-key management method that involves the creation of 5 separate keys.

Submit

24. IPSec supports what ciphers?

Submit

25. A device that blocks or allows traffic to pass through it's port entry.

Submit

26. This is to maintain a user data base or may proxy with an external LDAP database to authenticate user credentials.

Submit

27. What is normally an open network that has no WPA/WPA2 encryption and is an open network?

Submit

28. Many organizations provide what guest access with a unique SSID and a user VLAN

Submit

29. What term describes the primary goal to provide data privacy by encrypting the data before transmission?

Submit

30. Point-to-Point Tunneling uses what for user authentication?

Submit

31. One of the two major types of layer 3 VPN technologies?

Submit

32. What algorithm is used in technologies that are often used to protect Internet traffic, such as SSL?

Submit

33. What encryption algorithm uses a method known as Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

Submit

34. This security method can be achieved through the use of firewalls, routers, VPNs, and VLANs.

Submit

35. Guest traffic is usually segmented from corporate user traffic in a unique way tied to a unique guest subnet.

Submit

36. What is often a requirement of many industry regulations such as the payment card industry (PCI)?

Submit

37. What is a layer 2 encryption method that uses RC4 streaming cipher?

Submit

38. What is a layer 2 authentication protocol used to provide user authentication?

Submit

39. TKIP uses a stronger data integrity check known as what to migrate known bit-flipping attacks against WEP?

Submit

40. What is used to create spare broadcast domains in a layer 2 network and are often used to restrict access to network resources without regard to physical topology of the network.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (40)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Every network card has a physical address known as a?
A stand-alone access point would be the authenticator, would be a...
What is an algorithm used to perform encryption?
What technology can provide the necessary level of security for remote...
Effectively turns a web browser into an authentication device.
Equipment usually can be configured through a CLI or a web interface...
What is the verification of user identity and credentials?
What involves granting access to network resources and services?
An optional method for robust security networks that uses the RC4...
An approach to restricting system aces to authorized users?
The method that uses the CCMP also uses what encryption algorithm?
A server that validates the credential of the supplicant that is...
The default encryption code defined under the 802.11i amendment is...
The term cloaking is used to describe hiding your what?
One of the two major types of layer 3 VPN technologies?
What is tracking the use of network resources by users called?
A common use of this technology is to provide site-to-site...
What security method separates user traffic within a network?
This could either be a PSK or AEP protocol used during 802.1X...
What can be defined through use of mac filters, ACLs, and firewall...
A data integrated checksum known as what is computed on data before...
A host with software that is requiring authentication and access to...
What utilizes a dynamic encryption-key management method that involves...
IPSec supports what ciphers?
A device that blocks or allows traffic to pass through it's port...
This is to maintain a user data base or may proxy with an external...
What is normally an open network that has no WPA/WPA2 encryption and...
Many organizations provide what guest access with a unique SSID and a...
What term describes the primary goal to provide data privacy by...
Point-to-Point Tunneling uses what for user authentication?
One of the two major types of layer 3 VPN technologies?
What algorithm is used in technologies that are often used to protect...
What encryption algorithm uses a method known as Counter Mode with...
This security method can be achieved through the use of firewalls,...
Guest traffic is usually segmented from corporate user traffic in a...
What is often a requirement of many industry regulations such as the...
What is a layer 2 encryption method that uses RC4 streaming cipher?
What is a layer 2 authentication protocol used to provide user...
TKIP uses a stronger data integrity check known as what to migrate...
What is used to create spare broadcast domains in a layer 2 network...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!