CWNA

52 Questions | Total Attempts: 104

SettingsSettingsSettings
Please wait...
CWNA

Final


Questions and Answers
  • 1. 
    In WPA-PSK and WPA2-PSK, the Pairwise Transient Key (PTK) is a dynamic key that is per session / per client
    • A. 

      True

    • B. 

      False

  • 2. 
    When using an 802.11 wireless controller solution with an 802.1x framework, which device would be considered the authenticator?
    • A. 

      Access Point

    • B. 

      WLAN Controller

    • C. 

      RADIUS Server

    • D. 

      VLAN

  • 3. 
    If an attacker compromises a Pairwise Transient Key (PTK) in a WPA based network, they will be able to decrypt all of the traffic on that wireless network.
    • A. 

      True

    • B. 

      False

  • 4. 
    Which key is used to encrypt and decrypt unicast traffic between a client station and AP in a WPA / WPA 2 implementation?
    • A. 

      MIC

    • B. 

      GTK

    • C. 

      PTK

    • D. 

      PMK

  • 5. 
    Which wireless security implementation offers this highest level of security available using today’s standards?
    • A. 

      WPA-TKIP

    • B. 

      WPA2-RSA

    • C. 

      WPA2-TKIP

    • D. 

      WPA2-AES

  • 6. 
    What three main components constitute an 802.1X/EAP framework? (Choose Three)
    • A. 

      Supplicant

    • B. 

      Network Access Control

    • C. 

      Authorizer

    • D. 

      Authentication Server

    • E. 

      Authenticator

  • 7. 
    If an attacker compromises the shared key in a WEP based network, they will be able to decrypt all of the traffic on that wireless network.
    • A. 

      True

    • B. 

      False

  • 8. 
    In a WPA-PSK implementation, the pre-shared key is the same key used to encrypt and decrypt unicast traffic.
    • A. 

      True

    • B. 

      False

  • 9. 
    TKIP has been cracked
    • A. 

      True

    • B. 

      False

  • 10. 
    Which key is used to decrypt broadcast and multicast traffic in a WPA / WPA2 implementation?
    • A. 

      MIC

    • B. 

      PTK

    • C. 

      PMK

    • D. 

      GTK

  • 11. 
    Which cipher suites are available in WPA2? (Choose all that apply)
    • A. 

      TKIP-AES

    • B. 

      CCMP-AES

    • C. 

      CCMP-RSA

    • D. 

      TKIP-RC4

  • 12. 
    Which current wireless security standard is 802.11i compliant?
    • A. 

      EIEIO

    • B. 

      WPA

    • C. 

      WEP

    • D. 

      WPA2

  • 13. 
    Which cipher suites are available in WPA? (Choose all that apply)
    • A. 

      CCMP-AES

    • B. 

      TKIP-RC4

    • C. 

      CCMP-RSA

    • D. 

      TKIP-AES

  • 14. 
    Which wireless security implementation would be the most secure option for SOHO WLAN implementation which do not have RADIUS servers available?
    • A. 

      WPA2 + EAP / CCMP

    • B. 

      WPA-PSK / TKIP

    • C. 

      WPA2 + EAP / TKIP

    • D. 

      WPA2-PSK / CCMP

  • 15. 
    Which security solution may be used to segment a LAN or wireless LAN
    • A. 

      CCMP

    • B. 

      TKIP

    • C. 

      VLAN

    • D. 

      WEP

  • 16. 
    You want to place users on different network segments once they authenticate based on the users role. Which technology will help you achieve this?
    • A. 

      WPA

    • B. 

      RBAC

    • C. 

      802.11i

    • D. 

      Wireless Intrusion Prevention Systems

  • 17. 
    Which of the following factors indicate that a RSN is being used? (Choose Two)
    • A. 

      RBAC features have been turned on

    • B. 

      Secure 4-way handshake authentication

    • C. 

      Dynamic Encryption Keys

    • D. 

      WEP is being used as the cipher suite

  • 18. 
    Hiding the SSID provides good security for wireless networks
    • A. 

      True

    • B. 

      False

  • 19. 
    Which IEEE Standard defines the framework for port-based authentication?
    • A. 

      802.1X

    • B. 

      802.11i

    • C. 

      802.1q

    • D. 

      EAP

  • 20. 
    Which encryption algorithm is used by the CCMP cipher suite?
    • A. 

      3DES

    • B. 

      RSA

    • C. 

      AES

    • D. 

      RC4

  • 21. 
    Which encryption algorithm is used by the WEP cipher suite?
    • A. 

      RC4

    • B. 

      RSA

    • C. 

      3DES

    • D. 

      AES

  • 22. 
    Which encryption algorithm is used by the TKIP cipher suite?
    • A. 

      3DES

    • B. 

      RSA

    • C. 

      RC4

    • D. 

      AES

  • 23. 
    Which of the following are weaknesses of WEP?
    • A. 

      Weak IVs (Initialization Vectors)

    • B. 

      Short User Encryption Keys (40-bit and 104-bit)

    • C. 

      Lack of support for dynamic encryption keys

    • D. 

      All of the above

  • 24. 
    AES has been cracked
    • A. 

      True

    • B. 

      False

  • 25. 
    The manager of the factory where you work as a network technician has asked you to implement a secure WLAN. In your research, you determine that your organization should implement AES encryption and 802.1X with EAP authentication and key management protocol. Which Wi-Fi Alliance certification will meet your needs?
    • A. 

      WPA2-Personal

    • B. 

      WPA-Enterprise

    • C. 

      WPA2-Enterprise

    • D. 

      WPA-Personal