Deck 28: Securing Wireless Networks
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/12
العب
ملء الشاشة (f)
Deck 28: Securing Wireless Networks
1
Which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame?
A) MIC
B) KIP
C) OAuth
D) EAP
A) MIC
B) KIP
C) OAuth
D) EAP
MIC
2
The original 802.11 standard offered which of the following authentication methods? (Select all that apply.)
A) WPA2
B) LEAP
C) WEP
D) Open Authentication
A) WPA2
B) LEAP
C) WEP
D) Open Authentication
WEP
Open Authentication
Open Authentication
3
The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?
A) Blowfish
B) HMAC
C) AES
D) RC4
A) Blowfish
B) HMAC
C) AES
D) RC4
RC4
4
What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?
A) Expanded Authentication Protocol
B) Wireless Security Protocol
C) Extensible Authentication Protocol
D) Multi-security Protocol
A) Expanded Authentication Protocol
B) Wireless Security Protocol
C) Extensible Authentication Protocol
D) Multi-security Protocol
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
5
In a scenario using 802.1x and EAP-based authentication, the term supplicant refers to which of the following?
A) The network device that provides access to the network
B) The client device requesting access
C) The device that takes user or client credentials and permits/denies access
D) The wired uplink connection
A) The network device that provides access to the network
B) The client device requesting access
C) The device that takes user or client credentials and permits/denies access
D) The wired uplink connection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is a wireless authentication method, developed by Cisco, in which authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant?
A) EAP-FAST
B) PEAP
C) EAP-TLS
D) GCMP
A) EAP-FAST
B) PEAP
C) EAP-TLS
D) GCMP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which method of wireless authentication leverages a digital certificate on the AS as a robust method to authenticate the RADIUS server?
A) EAP-FAST
B) EAP
C) PEAP
D) LEAP
A) EAP-FAST
B) EAP
C) PEAP
D) LEAP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
8
One disadvantage of EAP-TLS is which of the following?
A) It's not as secure as other authentication methods.
B) It can be complex to implement.
C) It isn't compatible with many network types.
D) It can only be used in small networks.
A) It's not as secure as other authentication methods.
B) It can be complex to implement.
C) It isn't compatible with many network types.
D) It can only be used in small networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which authentication method is considered the most secure wireless authentication method currently available?
A) EAP-FAST
B) PEAP
C) LEAP
D) EAP-TLS
A) EAP-FAST
B) PEAP
C) LEAP
D) EAP-TLS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which WPA version has encryption and MIC with AES and GCMP?
A) WPA
B) WPA2
C) WPA3
D) WPA4
A) WPA
B) WPA2
C) WPA3
D) WPA4
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which WPA version adds additional features such as Simultaneous Authentication of Equals (SAE), Forward secrecy, and Protected management frames (PMF)?
A) WPA
B) WPA2
C) WPA3
D) These features are not in any version of WPA.
A) WPA
B) WPA2
C) WPA3
D) These features are not in any version of WPA.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which one of the following is the data encryption and integrity method used by WPA2?
A) CCMP
B) GCMP
C) TKIP
D) WIPS
A) CCMP
B) GCMP
C) TKIP
D) WIPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 12 في هذه المجموعة.
فتح الحزمة
k this deck