151-200 Flashcards
Which of the following is a wireless device that is created to allow a cracker to conduct a man-in- the-middle attack?
A. Protocol analyzer
B. Lightweight Access Point
C. WLAN controller
D. Rogue access point
D
You work as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-based network. The company has a main office and several branch offices. You want to centralize theadministration. Therefore, you implement a Remote Authentication Dial-In Service (RADIUS) server. Each branch office supports its own Routing and Remote Access Server. You remove the default remote access policy, as you want to secure communications and implement a single policy that requires all dial-up
communications to use a 40-bit encryption. What will you do to accomplish this? Each correct answer represents a part of the solution. Choose two.
A. Set the level of encryption to Basic in the remote access policy.
B. Create a remote access policy on the RADIUS server.
C. Create a remote access policy on the Routing and Remote Access Server of each branch office.
D. Set the level of encryption to No Encryption in the remote access policy.
A, B
Which of the following keys is derived by Pairwise Master Key (PMK)?
A. Private Key
B. Pairwise Transient Key
C. Public Key
D. Group Temporal Key
B
Which of the following components are normally required to secure wireless 802.11 networks?
Each correct answer represents a complete solution. Choose all that apply.
A. Segmentation
B. Authentication
C. Strong encryption
D. Accessibility
A, B, C
Your client has a brand new laptop. He is trying to connect to his home network, which is using an older (802.11b) wireless router. The router is set for encryption but not MAC filtering. What is the most likely problem?
A. His laptop has a newer operating system that cannot communicate with the router.
B. His physical address for the laptop is not in the router.
C. His laptop is using the WPA encryption protocol.
D. The laptop does not have a wireless NIC.
C
Which of the following protocols is used for authentication in an 802.1X framework?
A. IPSec
B. TKIP
C. EAP
D. L2TP
C
Which of the following is a security access control technique that allows or prevents specific network devices from accessing the network?
A. Ingress filtering
B. MAC filtering
C. Route filtering
D. Packet filtering
B
Which of the following protocols is used by Point-to-Point (PPP) servers to validate the identity of remote clients?
A. EAP-TTLS
B. CHAP
C. PPP
D. IPSec
B
Which of the following is the most secure protocol used for encryption in a wireless network?
A. WPA2
B. WPA
C. WEP
D. IPSec
A
Which of the following are secure device management protocols?
Each correct answer represents a complete solution. Choose all that apply.
A. SNMPv3
B. HTTP
C. HTTPS
D. SSH
A, C, D
Which of the following is an infrastructure system that allows the secure exchange of data over an unsecured network?
A. PKI
B. PMK
C. PTK
D. GTK
A
Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?
A. L2TP
B. WEP
C. IPSec
D. WPA
B
You work as a Network Administrator for uCertify Inc. You need to set up a management system on your network. Which of the following protocols will you use to manage your network?
A. SNMP
B. TCP
C. HTTP
D. IP
A
Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?
A. Firewall
B. Snort
C. IDS
D. WIPS
D
Which of the following protocols ensures that all relevant information is delivered to the correct access point to which the client station is associated?
A. IAPP
B. PPP
C. CHAP
D. MS-CHAP
A
Which of the following is a passive device that views the current content of the packet traveling on the network?
A. Spectrum analyzer
B. Protocol analyzer
C. WLAN controller
D. Rogue AP
B
Which of the following are the main components of a Wi-Fi Protected Setup (WPS) protocol architecture?
Each correct answer represents a part of the solution. Choose all that apply.
A. Authenticator
B. Registrar
C. Supplicant
D. Enrollee
A, B, D
Which of the following wireless security features provides the best wireless security mechanism?
A. WPA
B. WPA with 802.1X authentication
C. WEP
D. WPA with Pre Shared Key
B
Which of the following are tunneling protocols used in a virtual private network (VPN)?
Each correct answer represents a complete solution. Choose all that apply.
A. MD5
B. L2TP
C. PPTP
D. SCP
B, C
On which of the following, digital signatures are based?
Each correct answer represents a complete solution. Choose two.
A. Hashing functions
B. Symmetric encryption
C. RADIUS
D. Asymmetric encryption
A, D