Quizzes
Search
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Create a Quiz
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Search
Create A Quiz
Take Quizzes
Animal
Nutrition
Love
Relationship
Computer
Sports
Society
Business
Geography
Language
Personality
Harry Potter
Movie
Television
Music
Online Exam
Health
Country
Art
Entertainment
Celebrity
Math
Game
Book
Fun
Science
Food
History
Education
All Topics
Products
Quiz Maker
Training Maker
Survey Maker
Flashcards
Brain Games
See All
ProProfs.com
Quizzes
Quizzes
›
IT Certification
CWNA Chapter 13
40 Questions
|
By KillaCadillack | Updated: Mar 14, 2022
| Attempts: 184
Share
Start
Share on Facebook
Share on Twitter
Share on Whatsapp
Share on Pinterest
Share on Email
Copy to Clipboard
Embed on your website
Question
1
/ 40
0 %
0/100
Score
0/100
1.
Every network card has a physical address known as a?
MAC address
Logical address
IP address
SSID address
Submit
Start Quiz
About This Quiz
2.
What's your name?
We’ll put your name on your report, certificate, and leaderboard.
2.
A stand-alone access point would be the authenticator, would be a manager switch, and the authentication server would typically be a _____ Server.
RADIUS
Authorizer
SQL
Mainframe
Submit
3.
What is an algorithm used to perform encryption?
Authorization
Cipher
Authentication
Protocol
Submit
4.
What technology can provide the necessary level of security for remote access when end users connect to public access WLANS.
VPN
AES
WiFi
HTTP
Submit
5.
Effectively turns a web browser into an authentication device.
Captive portal
DNS
HTTP
SSL
Submit
6.
Equipment usually can be configured through a CLI or a web interface or via?
SNMP
AES
RBAC
VLAN
Submit
7.
What is the verification of user identity and credentials?
Authorization
Authentication
Accounting
Encryption
Submit
8.
What involves granting access to network resources and services?
Authorization
Authentication
Accounting
Encryption
Submit
9.
An optional method for robust security networks that uses the RC4 cipher just as WEP encryption does?
TKIP
PSK
PMK
GTK
Submit
10.
An approach to restricting system aces to authorized users?
RBAC
WLAN
VLAN
WMAN
Submit
11.
The method that uses the CCMP also uses what encryption algorithm?
AES
MIC
PSK
WEP
Submit
12.
A server that validates the credential of the supplicant that is requesting access and notifies the authenticator that the supplicant had been authorized.
Supplicant
Authenticator
Authentication server
Authorizer
Submit
13.
The default encryption code defined under the 802.11i amendment is known as what?
CCMP
WEP
MIC
PSK
Submit
14.
The term cloaking is used to describe hiding your what?
SSID
Logical address
IP address
Physical address
Submit
15.
One of the two major types of layer 3 VPN technologies?
PPTP
AES
VLAN
RBAC
Submit
16.
What is tracking the use of network resources by users called?
Authorization
Authentication
Accounting
Encryption
Submit
17.
A common use of this technology is to provide site-to-site connectivity between a remote office and corporate office
AES
WiFi
VPN
HTTP
Submit
18.
What security method separates user traffic within a network?
Data privacy
AAA
Segmentation
Monitoring and Policy
Submit
19.
This could either be a PSK or AEP protocol used during 802.1X authentication.
AKMP
MAC
WLAN
SSID
Submit
20.
What can be defined through use of mac filters, ACLs, and firewall rules?
Permissions
Restrictions
Allowance
Guest
Submit
21.
A data integrated checksum known as what is computed on data before encryption?
ICV
AES
SSL
MSDU
Submit
22.
A host with software that is requiring authentication and access to network resources.
Supplicant
Authenticator
Authentication Server
Authorizer
Submit
23.
What utilizes a dynamic encryption-key management method that involves the creation of 5 separate keys.
RSNAs
WEP
EAP
WPA/WPA2
Submit
24.
IPSec supports what ciphers?
DES
3DES
SSL
All of the above
Submit
25.
A device that blocks or allows traffic to pass through it's port entry.
Supplicant
Authenticator
Authentication server
Authorizer
Submit
26.
This is to maintain a user data base or may proxy with an external LDAP database to authenticate user credentials.
Supplicant
Authenticator
Authentication Server
Authorizer
Submit
27.
What is normally an open network that has no WPA/WPA2 encryption and is an open network?
Guest SSID
Guest VLAN
WiFi
WPAN
Submit
28.
Many organizations provide what guest access with a unique SSID and a user VLAN
WLAN
VPN
AES
HTTP
Submit
29.
What term describes the primary goal to provide data privacy by encrypting the data before transmission?
Access control
Data integrity
Confidentiality
Open season
Submit
30.
Point-to-Point Tunneling uses what for user authentication?
MS-CHAP
AES
SSL
DES
Submit
31.
One of the two major types of layer 3 VPN technologies?
AES
VLAN
RBAC
IPSec
Submit
32.
What algorithm is used in technologies that are often used to protect Internet traffic, such as SSL?
AES
WEP
RC4 Algorithm
Authentication
Submit
33.
What encryption algorithm uses a method known as Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
AES
WEP
RC4 Algorithm
Authentication
Submit
34.
This security method can be achieved through the use of firewalls, routers, VPNs, and VLANs.
Data privacy
AAA
Segmentation
Monitoring and Policy
Submit
35.
Guest traffic is usually segmented from corporate user traffic in a unique way tied to a unique guest subnet.
Guest SSID
Guest VLAN
Guest WiFi
WPAN
Submit
36.
What is often a requirement of many industry regulations such as the payment card industry (PCI)?
Authorization
Authentication
Accounting
Encryption
Submit
37.
What is a layer 2 encryption method that uses RC4 streaming cipher?
WPA
WEP
CRC
IV
Submit
38.
What is a layer 2 authentication protocol used to provide user authentication?
WLAN
EAP
WEP
WPA/WPA2
Submit
39.
TKIP uses a stronger data integrity check known as what to migrate known bit-flipping attacks against WEP?
CCMP
WEP
MIC
PSK
Submit
40.
What is used to create spare broadcast domains in a layer 2 network and are often used to restrict access to network resources without regard to physical topology of the network.
VLAN
WWAN
WAN
WPAN
Submit
View My Results
Related Quizzes
CWNA Wireless Network Administrator
CWNA Wireless Network Administrator
Chapter 13: Liquids
Chapter 13: Liquids
Chapter 11-13
Chapter 11-13
Thank you for your feedback!
Would you like to edit this question to improve it?
No thanks
Name:
Email:
Oops! Give us more information:
Incorrect Question
Incorrect Answer
Typos
I have a feedback
Submit
Please provide name and email to proceed.
Please provide correct email to proceed.
Please provide feedback.
Please select the option.
All (40)
Unanswered (
)
Answered (
)
Every network card has a physical address known as a?
A stand-alone access point would be the authenticator, would be a...
What is an algorithm used to perform encryption?
What technology can provide the necessary level of security for remote...
Effectively turns a web browser into an authentication device.
Equipment usually can be configured through a CLI or a web interface...
What is the verification of user identity and credentials?
What involves granting access to network resources and services?
An optional method for robust security networks that uses the RC4...
An approach to restricting system aces to authorized users?
The method that uses the CCMP also uses what encryption algorithm?
A server that validates the credential of the supplicant that is...
The default encryption code defined under the 802.11i amendment is...
The term cloaking is used to describe hiding your what?
One of the two major types of layer 3 VPN technologies?
What is tracking the use of network resources by users called?
A common use of this technology is to provide site-to-site...
What security method separates user traffic within a network?
This could either be a PSK or AEP protocol used during 802.1X...
What can be defined through use of mac filters, ACLs, and firewall...
A data integrated checksum known as what is computed on data before...
A host with software that is requiring authentication and access to...
What utilizes a dynamic encryption-key management method that involves...
IPSec supports what ciphers?
A device that blocks or allows traffic to pass through it's port...
This is to maintain a user data base or may proxy with an external...
What is normally an open network that has no WPA/WPA2 encryption and...
Many organizations provide what guest access with a unique SSID and a...
What term describes the primary goal to provide data privacy by...
Point-to-Point Tunneling uses what for user authentication?
One of the two major types of layer 3 VPN technologies?
What algorithm is used in technologies that are often used to protect...
What encryption algorithm uses a method known as Counter Mode with...
This security method can be achieved through the use of firewalls,...
Guest traffic is usually segmented from corporate user traffic in a...
What is often a requirement of many industry regulations such as the...
What is a layer 2 encryption method that uses RC4 streaming cipher?
What is a layer 2 authentication protocol used to provide user...
TKIP uses a stronger data integrity check known as what to migrate...
What is used to create spare broadcast domains in a layer 2 network...
X
OK
X
OK
Cancel
X
OK
Cancel
Advertisement