CWNA Chapter 13

25 Questions

Settings
CWNA Quizzes & Trivia

Questions and Answers
  • 1. 
    What is an algorithm used to perform encryption?
    • A. 

      Authorization

    • B. 

      Cipher

    • C. 

      Authentication

    • D. 

      Protocol

  • 2. 
    What algorithm is used in technologies that are often used to protect Internet traffic, such as SSL?
    • A. 

      AES

    • B. 

      WEP

    • C. 

      RC4 Algorithm

    • D. 

      Authentication

  • 3. 
    What encryption algorithm uses a method known as Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)
    • A. 

      AES

    • B. 

      WEP

    • C. 

      RC4 Algorithm

    • D. 

      Authentication

  • 4. 
    What is the verification of user identity and credentials?
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Accounting

    • D. 

      Encryption

  • 5. 
    What involves granting access to network resources and services?
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Accounting

    • D. 

      Encryption

  • 6. 
    What is tracking the use of network resources by users called?
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Accounting

    • D. 

      Encryption

  • 7. 
    What is often a requirement of many industry regulations such as the payment card industry (PCI)?
    • A. 

      Authorization

    • B. 

      Authentication

    • C. 

      Accounting

    • D. 

      Encryption

  • 8. 
    What security method separates user traffic within a network?
    • A. 

      Data privacy

    • B. 

      AAA

    • C. 

      Segmentation

    • D. 

      Monitoring and Policy

  • 9. 
    This security method can be achieved through the use of firewalls, routers, VPNs, and VLANs.
    • A. 

      Data privacy

    • B. 

      AAA

    • C. 

      Segmentation

    • D. 

      Monitoring and Policy

  • 10. 
    What is a layer 2 encryption method that uses RC4 streaming cipher?
    • A. 

      WPA

    • B. 

      WEP

    • C. 

      CRC

    • D. 

      IV

  • 11. 
    What term describes the primary goal to provide data privacy by encrypting the data before transmission?
    • A. 

      Access control

    • B. 

      Data integrity

    • C. 

      Confidentiality

    • D. 

      Open season

  • 12. 
    A data integrated checksum known as what is computed on data before encryption?
    • A. 

      ICV

    • B. 

      AES

    • C. 

      SSL

    • D. 

      MSDU

  • 13. 
    Every network card has a physical address known as a?
    • A. 

      MAC address

    • B. 

      Logical address

    • C. 

      IP address

    • D. 

      SSID address

  • 14. 
    The term cloaking is used to describe hiding your what?
    • A. 

      SSID

    • B. 

      Logical address

    • C. 

      IP address

    • D. 

      Physical address

  • 15. 
    This could either be a PSK or AEP protocol used during 802.1X authentication.
    • A. 

      AKMP

    • B. 

      MAC

    • C. 

      WLAN

    • D. 

      SSID

  • 16. 
    A host with software that is requiring authentication and access to network resources.
    • A. 

      Supplicant

    • B. 

      Authenticator

    • C. 

      Authentication Server

    • D. 

      Authorizer

  • 17. 
    A device that blocks or allows traffic to pass through it's port entry.
    • A. 

      Supplicant

    • B. 

      Authenticator

    • C. 

      Authentication server

    • D. 

      Authorizer

  • 18. 
    A server that validates the credential of the supplicant that is requesting access and notifies the authenticator that the supplicant had been authorized. 
    • A. 

      Supplicant

    • B. 

      Authenticator

    • C. 

      Authentication server

    • D. 

      Authorizer

  • 19. 
    This is to maintain a user data base or may proxy with an external LDAP database to authenticate user credentials.
    • A. 

      Supplicant

    • B. 

      Authenticator

    • C. 

      Authentication Server

    • D. 

      Authorizer

  • 20. 
    A stand-alone access point would be the authenticator, would be a manager switch, and the authentication server would typically be a _____ Server.
    • A. 

      RADIUS

    • B. 

      Authorizer

    • C. 

      SQL

    • D. 

      Mainframe

  • 21. 
    What is a layer 2 authentication protocol used to provide user authentication?
    • A. 

      WLAN

    • B. 

      EAP

    • C. 

      WEP

    • D. 

      WPA/WPA2

  • 22. 
    What utilizes a dynamic encryption-key management method that involves the creation of 5 separate keys.
    • A. 

      RSNAs

    • B. 

      WEP

    • C. 

      EAP

    • D. 

      WPA/WPA2

  • 23. 
    An optional method for robust security networks that uses the RC4 cipher just as WEP encryption does?
    • A. 

      TKIP

    • B. 

      PSK

    • C. 

      PMK

    • D. 

      GTK

  • 24. 
    TKIP uses a stronger data integrity check known as what to migrate known bit-flipping attacks against WEP?
    • A. 

      CCMP

    • B. 

      WEP

    • C. 

      MIC

    • D. 

      PSK

  • 25. 
    The default encryption code defined under the 802.11i amendment is known as what?
    • A. 

      CCMP

    • B. 

      WEP

    • C. 

      MIC

    • D. 

      PSK