Final
True
False
Access Point
WLAN Controller
RADIUS Server
VLAN
True
False
MIC
GTK
PTK
PMK
WPA-TKIP
WPA2-RSA
WPA2-TKIP
WPA2-AES
Supplicant
Network Access Control
Authorizer
Authentication Server
Authenticator
True
False
True
False
True
False
MIC
PTK
PMK
GTK
TKIP-AES
CCMP-AES
CCMP-RSA
TKIP-RC4
EIEIO
WPA
WEP
WPA2
CCMP-AES
TKIP-RC4
CCMP-RSA
TKIP-AES
WPA2 + EAP / CCMP
WPA-PSK / TKIP
WPA2 + EAP / TKIP
WPA2-PSK / CCMP
CCMP
TKIP
VLAN
WEP
WPA
RBAC
802.11i
Wireless Intrusion Prevention Systems
RBAC features have been turned on
Secure 4-way handshake authentication
Dynamic Encryption Keys
WEP is being used as the cipher suite
True
False
802.1X
802.11i
802.1q
EAP
3DES
RSA
AES
RC4
RC4
RSA
3DES
AES
3DES
RSA
RC4
AES
Weak IVs (Initialization Vectors)
Short User Encryption Keys (40-bit and 104-bit)
Lack of support for dynamic encryption keys
All of the above
True
False
WPA2-Personal
WPA-Enterprise
WPA2-Enterprise
WPA-Personal
True
False
WPA-PSK / TKIP
WPA2 + EAP / CCMP
WPA2-PSK / CCMP
WPA2 + EAP / TKIP
PSK Cracking
Denial of Service
Eavesdropping
Encryption Cracking
Denial of Service
Authentication Cracking
Encryption Cracking
Eavesdropping
MAC spoofing
Man-in-the-middle
Jamming
Peer-to-peer
They may allow unsecured access into your LAN
They may interfere with RF channel settings on production APs
Users may unknowingly connect to the rogue AP and expose sensitive data
All of the above
MAC addresses are not long enough
MAC addresses can be easily guessed
There are no weaknesses to MAC filtering
MAC addresses can be easily spoofed
Hijacking
Denial of Service
Encryption Cracking
Authentication Cracking
Protocol Analyzer (Evesdropping)
De-authentication Spoofing
Association flood
Rogue Access Point
MAC spoofing
Stateful Packet Firewall
SNMP based network monitoring system
Wireless IPS
Wireless IDS
PSK Cracking
Denial of Service
Eavesdropping
Encryption Cracking
Authentication Cracking
Encryption Cracking
Denial of Service
Management Interface Exploits
Yes. It is secure because the pre-shared key is at least five characters long.
No. Because WPA-PSK is just as insecure as WEP, it should never be used.
Yes. It is secure because WPA-PSK resolved the problems with WEP.
No. Because it only includes the company name plus one digit, it could be easily guessed.
Integrity
IDK
Confidentiality
Availability
True
False
Encryption Cracking
PSK Cracking
Authentication Cracking
Management Interface Exploits
PSK Cracking
Encryption Cracking
Peer-to-Peer Attacks
Authentication Cracking
Encryption Cracking
Denial of Service
Management Interface Exploit
Hijacking
PSK Cracking
Social Engineering
Authentication Cracking
Eavesdropping
Accounting
Authentication
Authorization
Attack Logging
SNMP based network monitoring system
Wireless IPS
Wireless IDS
Stateful Packet Firewall
Confidentiality
Integrity
Availability
IDK
Employee and End User Training
Strong Encryption
Strong Passwords
Wireless Intrusion Prevention Systems
True
False
True
False
Quiz Review Timeline +
Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.
Wait!
Here's an interesting quiz for you.