CWNA Chapter 13

40 Questions | Attempts: 184
Share
SettingsSettings
Please wait...
  • 1/40 Questions

    Every network card has a physical address known as a?

    • MAC address
    • Logical address
    • IP address
    • SSID address
Please wait...

Quiz Preview

  • 2. 

    A stand-alone access point would be the authenticator, would be a manager switch, and the authentication server would typically be a _____ Server.

    • RADIUS

    • Authorizer

    • SQL

    • Mainframe

    Correct Answer
    A. RADIUS
  • 3. 

    What is an algorithm used to perform encryption?

    • Authorization

    • Cipher

    • Authentication

    • Protocol

    Correct Answer
    A. Cipher
  • 4. 

    What technology can provide the necessary level of security for remote access when end users connect to public access WLANS.

    • VPN

    • AES

    • WiFi

    • HTTP

    Correct Answer
    A. VPN
  • 5. 

    Effectively turns a web browser into an authentication device.

    • Captive portal

    • DNS

    • HTTP

    • SSL

    Correct Answer
    A. Captive portal
  • 6. 

    Equipment usually can be configured through a CLI or a web interface or via?

    • SNMP

    • AES

    • RBAC

    • VLAN

    Correct Answer
    A. SNMP
  • 7. 

    What is the verification of user identity and credentials?

    • Authorization

    • Authentication

    • Accounting

    • Encryption

    Correct Answer
    A. Authentication
  • 8. 

    What involves granting access to network resources and services?

    • Authorization

    • Authentication

    • Accounting

    • Encryption

    Correct Answer
    A. Authorization
  • 9. 

    An optional method for robust security networks that uses the RC4 cipher just as WEP encryption does?

    • TKIP

    • PSK

    • PMK

    • GTK

    Correct Answer
    A. TKIP
  • 10. 

    An approach to restricting system aces to authorized users?

    • RBAC

    • WLAN

    • VLAN

    • WMAN

    Correct Answer
    A. RBAC
  • 11. 

    The method that uses the CCMP also uses what encryption algorithm?

    • AES

    • MIC

    • PSK

    • WEP

    Correct Answer
    A. AES
  • 12. 

    A server that validates the credential of the supplicant that is requesting access and notifies the authenticator that the supplicant had been authorized. 

    • Supplicant

    • Authenticator

    • Authentication server

    • Authorizer

    Correct Answer
    A. Authentication server
  • 13. 

    The default encryption code defined under the 802.11i amendment is known as what?

    • CCMP

    • WEP

    • MIC

    • PSK

    Correct Answer
    A. CCMP
  • 14. 

    The term cloaking is used to describe hiding your what?

    • SSID

    • Logical address

    • IP address

    • Physical address

    Correct Answer
    A. SSID
  • 15. 

    One of the two major types of layer 3 VPN technologies?

    • PPTP

    • AES

    • VLAN

    • RBAC

    Correct Answer
    A. PPTP
  • 16. 

    What is tracking the use of network resources by users called?

    • Authorization

    • Authentication

    • Accounting

    • Encryption

    Correct Answer
    A. Accounting
  • 17. 

    A common use of this technology is to provide site-to-site connectivity between a remote office and corporate office

    • AES

    • WiFi

    • VPN

    • HTTP

    Correct Answer
    A. VPN
  • 18. 

    What security method separates user traffic within a network?

    • Data privacy

    • AAA

    • Segmentation

    • Monitoring and Policy

    Correct Answer
    A. Segmentation
  • 19. 

    This could either be a PSK or AEP protocol used during 802.1X authentication.

    • AKMP

    • MAC

    • WLAN

    • SSID

    Correct Answer
    A. AKMP
  • 20. 

    What can be defined through use of mac filters, ACLs, and firewall rules?

    • Permissions

    • Restrictions

    • Allowance

    • Guest

    Correct Answer
    A. Permissions
  • 21. 

    A data integrated checksum known as what is computed on data before encryption?

    • ICV

    • AES

    • SSL

    • MSDU

    Correct Answer
    A. ICV
  • 22. 

    A host with software that is requiring authentication and access to network resources.

    • Supplicant

    • Authenticator

    • Authentication Server

    • Authorizer

    Correct Answer
    A. Supplicant
  • 23. 

    What utilizes a dynamic encryption-key management method that involves the creation of 5 separate keys.

    • RSNAs

    • WEP

    • EAP

    • WPA/WPA2

    Correct Answer
    A. RSNAs
  • 24. 

    IPSec supports what ciphers?

    • DES

    • 3DES

    • SSL

    • All of the above

    Correct Answer
    A. All of the above
  • 25. 

    A device that blocks or allows traffic to pass through it's port entry.

    • Supplicant

    • Authenticator

    • Authentication server

    • Authorizer

    Correct Answer
    A. Authenticator
  • 26. 

    This is to maintain a user data base or may proxy with an external LDAP database to authenticate user credentials.

    • Supplicant

    • Authenticator

    • Authentication Server

    • Authorizer

    Correct Answer
    A. Authentication Server
  • 27. 

    What is normally an open network that has no WPA/WPA2 encryption and is an open network?

    • Guest SSID

    • Guest VLAN

    • WiFi

    • WPAN

    Correct Answer
    A. Guest SSID
  • 28. 

    Many organizations provide what guest access with a unique SSID and a user VLAN

    • WLAN

    • VPN

    • AES

    • HTTP

    Correct Answer
    A. WLAN
  • 29. 

    What term describes the primary goal to provide data privacy by encrypting the data before transmission?

    • Access control

    • Data integrity

    • Confidentiality

    • Open season

    Correct Answer
    A. Confidentiality
  • 30. 

    Point-to-Point Tunneling uses what for user authentication?

    • MS-CHAP

    • AES

    • SSL

    • DES

    Correct Answer
    A. MS-CHAP
  • 31. 

    One of the two major types of layer 3 VPN technologies?

    • AES

    • VLAN

    • RBAC

    • IPSec

    Correct Answer
    A. IPSec
  • 32. 

    What algorithm is used in technologies that are often used to protect Internet traffic, such as SSL?

    • AES

    • WEP

    • RC4 Algorithm

    • Authentication

    Correct Answer
    A. RC4 Algorithm
  • 33. 

    What encryption algorithm uses a method known as Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP)

    • AES

    • WEP

    • RC4 Algorithm

    • Authentication

    Correct Answer
    A. AES
  • 34. 

    This security method can be achieved through the use of firewalls, routers, VPNs, and VLANs.

    • Data privacy

    • AAA

    • Segmentation

    • Monitoring and Policy

    Correct Answer
    A. Segmentation
  • 35. 

    Guest traffic is usually segmented from corporate user traffic in a unique way tied to a unique guest subnet.

    • Guest SSID

    • Guest VLAN

    • Guest WiFi

    • WPAN

    Correct Answer
    A. Guest VLAN
  • 36. 

    What is often a requirement of many industry regulations such as the payment card industry (PCI)?

    • Authorization

    • Authentication

    • Accounting

    • Encryption

    Correct Answer
    A. Accounting
  • 37. 

    What is a layer 2 encryption method that uses RC4 streaming cipher?

    • WPA

    • WEP

    • CRC

    • IV

    Correct Answer
    A. WEP
  • 38. 

    What is a layer 2 authentication protocol used to provide user authentication?

    • WLAN

    • EAP

    • WEP

    • WPA/WPA2

    Correct Answer
    A. EAP
  • 39. 

    TKIP uses a stronger data integrity check known as what to migrate known bit-flipping attacks against WEP?

    • CCMP

    • WEP

    • MIC

    • PSK

    Correct Answer
    A. MIC
  • 40. 

    What is used to create spare broadcast domains in a layer 2 network and are often used to restrict access to network resources without regard to physical topology of the network.

    • VLAN

    • WWAN

    • WAN

    • WPAN

    Correct Answer
    A. WWAN

Quiz Review Timeline (Updated): Mar 14, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 14, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 17, 2013
    Quiz Created by
    KillaCadillack
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.