Wireless Internet

22 Questions

Settings
Please wait...
Internet Quizzes & Trivia

.


Questions and Answers
  • 1. 
    Central authentication uses which IEEE specification?
    • A. 

      802.1q

    • B. 

      802.1x

    • C. 

      802.11a

    • D. 

      802.1d

  • 2. 
    Client MFP allows clients to perform what function?
    • A. 

      Detect invalid SSIDs

    • B. 

      Detect invalid clients

    • C. 

      Detect invalid controllers

    • D. 

      Detect invalid APs

  • 3. 
    In centralized authentication, a certificate is used based on information from a trusted third party. What information is not included in a certificate? 
    • A. 

      Public key

    • B. 

      Username

    • C. 

      Session keys

    • D. 

      Validity dates

  • 4. 
    Threats to wireless networks include which of the following? (Choose all that apply.)
    • A. 

      Client misassociation

    • B. 

      Stateful inspection

    • C. 

      Unauthorized port access

    • D. 

      Rogue APs

  • 5. 
    WEP uses which of the following encryption algorithms?
    • a. TKIP
    • b. AES
    • c. RC4
     
    • d. MD5 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 6. 
    What key size should be selected to perform 128 - bit WEP with a Windows client?Select one:
    • a. 128-bit
    • b. 192-bit
    • c. 104-bit
    • d. 40-bit 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 7. 
    Which EAP method uses a PAC instead of certificates?Select one:
    • a. EAP-FAST
    • b. EAP-MD5
    • c. EAP-TLS
    • d. PEAP 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 8. 
    Which EAP method uses certificates on both the client and the server?Select one:
    • a. EAP -TLS
    • b. EAP -MD5
    • c. EAP -FAST
    • d. PEAP 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 9. 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 10. 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 11. 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 12. 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 13. 
    How many bits does an IV add to a WEP key?Choose one answer.
    1. a. 188 bits    
    2. b. 24 bits    
    3. c. 8 bits    
    4. d. 48 bits
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 14. 
     If you select Static WEP as your Layer 2 security policy and you are supporting Windows clients, what key lengths can you choose for your Static WEP keys? (Choose all that apply.)Choose at least one answer.
    1. a. 64 - bit
    2. b. 128 -bit    
    3. c. 152 -bit    
    4. d. 40 - bit    
    5. e. 104 -bit
    • A. 

      Option1

    • B. 

      Option2

    • C. 

      Option3

    • D. 

      Option4

    • E. 

      Option5

  • 15. 
    To perform Client MFP, what version of CCX is required?Choose one answer.a. v6.x     b. v1.x     c. v5.x     d. v2.x 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 16. 
    What condition must be met to use MFP Version 2?Choose one answer.
    1. a. The network must have a TACACS+ server.
    2. b. Third - party sensors must be deployed to support MFP Version 2.
    3. c. Clients must be using a supplicant supporting CCX 5 or better.      
    4. d. The network must have a NAC appliance.
    5. e. The WLAN must use standalone APs. 
  • 17. 
     What Layer 2 security policy must you choose if you want to use AES encryption for a WLAN?Choose one answer.a. Static WEP b. WPA + WPA2    c. Web authentication    d. 802.1X     e. None 
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

    • E. 

      Option 5

  • 18. 
    What security threat is posed by an ad -hoc network connection?Choose one answer.
    1. a. Denial of service
    2. b. Bypassing of corporate security policies    
    3. c. Collection of authentication credentials
    4. d. Easily broken encryption 
  • 19. 
    Which EAP method creates a TLS tunnel to protect authentication credentials but does not depend on PKI to create the tunnel?Choose one answer.
    1. a. EAP -LEAP
    2. b. EAP -FAST    
    3. c. EAP -MD5    
    4. d. EAP -TLS    
    5. e. EAP -PEAP
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

    • E. 

      Option 5

  • 20. 
     Which of the following authentication methods is vulnerable to an offline exploit?Choose one answer.
    1. a. EAP -TLS
    2. b. EAP-PEAP    
    3. c. EAP-FAST    
    4. d. EAP-LEAP
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

  • 21. 
    Which of the following can be used to prevent misassociation attacks? (Choose all that apply.)Choose at least one answer.
    1. a. Infrastructure MFP
    2. b. Spoofing
    3. c. Rogue-AP containment
    4. d. Client MFP
    • A. 

      Option1

    • B. 

      Option2

    • C. 

      Option3

    • D. 

      Option4

  • 22. 
    Which of the following is not an authentication key management option under the Layer 2 security policy WPA + WPA2?Choose one answer.
    1. a. PSK
    2. b. 802.1X + CCKM
    3. c. 802.1D    
    4. d. 802.1X
    5. e. CCKM
    • A. 

      Option 1

    • B. 

      Option 2

    • C. 

      Option 3

    • D. 

      Option 4

    • E. 

      Option 5