17 Flashcards

1
Q

A monitoring port on a network device is referred to as

A

TAP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following wireless encryption schemes offers the highest level of protection?

A

WPA3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws?

A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the cryptographic algorithms listed below is the least vulnerable to attacks?

A

AES

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following encryption schemes is used in WiFi Protected Access 2 (WPA2)?

A

** AES-CCMP **
AES-Counter Mode CBC-MAC Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of: (Select 2 answers)

A

** AES-GCMP **

Galois Counter Mode Protocol (GCMP) is supported by 802.11ac, is more efficient than AES-CCMP and provides better performance for wireless clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following acronyms refers to a client authentication method used in WPA2 Personal mode?

A

PSK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following acronyms refers to a client authentication method used in WPA3 Personal mode?

A

** SAE **

SAE (Simultaneous Authentication of Equals): SAE is a key exchange protocol used in WPA3 for securing the initial connection setup. It improves security against offline dictionary attacks compared to the pre-shared key (PSK) used in WPA2.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Extensible Authentication Protocol (EAP) is an authentication framework frequently used in wireless networks and point-to-point connections. EAP provides an authentication framework, not a specific authentication mechanism. There are many authentication mechanisms (referred to as EAP methods) that can be used with EAP. Wireless networks take advantage of several EAP methods, including PEAP, EAP-FAST, EAP-TLS, and EAP-TTLS.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following EAP methods offers the highest level of security?

A

** EAP-TLS **

EAP-TLS (Transport Layer Security) EAP-TLS provides certificate-based, mutual authentication of the network and the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the EAP methods listed below relies on client-side and server-side certificates for authentication?

A

** EAP-TLS **

EAP-TLS (Transport Layer Security) EAP-TLS provides certificate-based, mutual authentication of the network and the client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following answers refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports?

A

IEEE 802.1X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following would be the best solution for securing a small network that lacks an authentication server?

A

** WPA3-SAE **

WPA3 uses Simultaneous Authentication of Equals (SAE) to provide stronger defenses against password guessing. SAE is a secure key establishment protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the characteristic features of WPA2/WPA3 Enterprise mode? (Select 3 answers)

A
  • Suitable for large corporate networks
  • IEEE 802.1X
  • Requires RADIUS authentication server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is known as:

A

** WPS **

WPS stands for WiFi Protected Setup. A router with a WPS button can allow any device to automatically connect to your router when the WPS button is pressed. When you press the WPS button, your router looks for compatible devices right away and allows those devices automatically connect.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers)

A
  • WPS
  • WEP
17
Q

Which of the following answers refers to a security solution that allows administrators to block network access for users until they perform required action?

A

Captive portal

18
Q

The process of planning and designing new WLANs for optimal performance, security and compliance typically involves:

A

Wireless site survey

19
Q

An administrator needs to adjust the placement of multiple Access Points (APs) to ensure the best wireless signal coverage for the network. Which of the following would be of help while identifying areas of low signal strength?

A

Heat map

20
Q

Which of the following answers refers to a diagnostic tool that can be used for measuring wireless signal strength?

A

WiFi analyzer

21
Q

In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as:

A

Channel overlapping

22
Q

A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11, 802.11b, 802.11g, and 802.11n networks, where the 2.401 - 2.473 GHz frequency range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum. Setting up a wireless network to operate on a non-overlapping channel (1, 6, and 11 in this case) allows multiple networks to coexist in the same area without causing interference

A

True

23
Q

Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? (Select 2 answers)

A
  • WAP power level controls
  • WiFi analyzer
24
Q

Which wireless antenna type provides a 360-degree horizontal signal coverage?

A

** Omnidirectional antenna **

Omnidirectional antennas receive signals equally well from all directions. This means they have a 360-degree reception pattern and are generally omnidirectional in the vertical and horizontal planes.

25
Q

Which of the following answers refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments?

A

** Omnidirectional antenna **

Omnidirectional antennas receive signals equally well from all directions. This means they have a 360-degree reception pattern and are generally omnidirectional in the vertical and horizontal planes.