201-250 Flashcards
802.1X/EAP-TLS supports what client authentication credential type?
A. Passwords
B. x.509 Certificates
C. Digital Security Token
D. MD5 Hash Exchange
E. Biometric
B
Which wireless security protocol cannot use digital certificates for both the supplicant and authentication server?
A. EAP-TLS
B. IPSec VPN
C. PEAPv0/EAP-TLS
D. EAP-TTLS
E. LEAP
E
Why do PEAPv0/EAP-TLS and PPTP/EAP-TLS offer stronger authentication than PEAPv0/EAP- MSCHAPv2 and PPTP/MS-CHAPv2?
A. MS-CHAPv2 supports only protected access credentials (PACs), but EAP-TLS supports smart cards andsecure tokens for client authentication.
B. EAP-TLS uses x.509 certificates for client and server authentication while MS-CHAPv2 uses passwordauthentication.
C. Use of MS-CHAPv2 allows only RADIUS to be used as an authentication server, but EAP-TLS allows bothRADIUS and TACACS+.
D. EAP-TLS supports hashing passwords before they are transmitted across the medium by clients, but MSCHAPv2supports only clear text passwords.
B
Which 802.1X/EAP type allows a maximum of three phases of authentication?
A. EAP-FAST
B. EAP-TTLS/MS-CHAPv2
C. PEAPv0/EAP-MSCHAPv2
D. PEAPv1/EAP-GTC
E. EAP-TLS
A
What is the primary difference between EAP-TLS and EAP-TTLS authentication?
A. EAP-TTLS provides strong client authentication and EAP-TLS does not
B. EAP-TLS is an authentication protocol, and EAP-TTLS is an encryption type
C. EAP-TTLS provides support for legacy client authentication methods, and EAP-TLS requires certificates forclient-side authentication
D. EAP-TLS uses a RADIUS server for authentication, and EAP-TTLS can only use Kerberos E. EAP-TLS uses IP-based authentication, and EAP-TTLS uses MAC-based authentication
C
Which statements are true regarding deployment of lightweight access points? (Choose four)
A. Lightweight access points support 802.3af and may connect directly to the WLAN controller or to anEthernet switch.
B. Lightweight access points may connect to the WLAN controller with either a Layer-2 or a Layer- 3 protocol.
C. Lightweight access points may be controlled over either Layer-2 or Layer-3.
D. Lightweight access points may use DNS to locate their assigned WLAN controller.
E. Lightweight access points cannot be deployed over the Internet due to Network Address Translation.
F. Lightweight access points may be configured for 802.11a or 802.11g, but not both simultaneously.
A, B, C, D
What is a consideration when implementing a security policy regarding wireless bridging?
A. Bridge links can be mistaken for public accesshot-spots
B. Bridge links should be used as corporate access points whenever possible
C. Bridge links can span miles so an intruder is unlikely to be seen or located
D. Bridge links cannot be protected by 802.1X/EAP authentication so an appropriate VPN solution must bechosen
E. Wireless intrusion prevention systems (WIPS) should always have the ‘false root detection’ feature enabled
C
As part of its corporate security policy, your organization requires all wireless LANs to be separated from the wired network core using a device capable of authentication, data encryption, and throughput limiting. Which device will accomplish this policy requirement?
A. Wireless workgroup bridge
B. Transparent tunneling bridge
C. Wireless LAN controller
D. Personal firewall software
C
Which statement describes a potential architectural performance disadvantage of some WLAN controllers with centralized forwarding and controller-based access points in a large-scale WLAN deployment?
A. Data encryption/decryption is always performed on the WLAN controller.
B. The 802.11 distribution system (DS) is located in the WLAN controller software.
C. All WLAN traffic must flow through the WLAN controller.
D. Management frames and Control frames are always encapsulated in 802.3 frames.
C
In order to implement a robust security network (RSN) as defined by the 802.11i-2004 amendment, an administrator may not implement _______________?
A. The Wired Equivalent Privacy (WEP) Cipher Suite
B. The STAKey Handshake
C. The Pass-phrase-to-Preshared Key Algorithm
D. The Group Key Handshake
E. The TKIP Message Integrity Check (MIC) called ‘Michael’
A
Given: The enhanced confidentiality, data authentication, and replay protection mechanisms of the 802.11i-2004 amendment require fresh cryptographic keys. What wireless components are defined by the 802.11i- 2004 amendment to provide fresh cryptographic keys? (Choose three)
A. 4-Way Handshake
B. EAPoL Handshake
C. Group Handshake
D. 802.1X/EAP Handshake
E. AES-CCMP Handshake
F. STAKey Handshake
A, C, F
The 802.11i 4-way handshake process is used with which secure WLAN implementations? (Choose two)
A. When WPA-Personal is used on a SOHO WLAN router
B. When static WEP-128 is used on a WLAN switch
C. When IPSec is used on an Enterprise Wireless Gateway
D. When WPA2-Enterprise is used on an enterprise class thick AP
E. When HTTPS is used for a WLANhot-spotlogin
A, D
In an 802.11i-compliant 802.1X/EAP system, where are AAA keys generated?
A. On the 802.1X Authentication Server only
B. Manually by the network administrator
C. Jointly negotiated between the 802.1X Supplicant andthe 802.1X AuthenticationServer
D. On the 802.1X Authenticator only
E. In the Pass-phrase-to-PSK mapping algorithm
F. On the 802.1X Supplicant only
C
ABC Company has a Microsoft Windows 2003 Active Directory (AD) environment with IAS (an EAP-enabled RADIUS server) installed at their corporate headquarters (HQ) and at all branch locations. The HQ IAS server is currently used to authenticate HQ 802.11g WLAN users. ABC is installing an 802.11g WLAN at a branch office, and they have hired you to advise them on the best way to implement authentication for branch WLAN users. How will you configure access points at the branch office for maximized authentication speed and reliability?
A. Authenticate against the HQ IAS server. The HQ IAS will look up the user on the HQ AD servers.
B. Authenticate against the branch IAS server. The branch IAS server will look up the user on the branch ADserver.
C. Authenticate against the branch IAS server. The branch IAS server will proxy the request to the HQ IASserver. The HQ IAS server will look up the user on the HQ AD servers.
D. Authenticate against the branch IAS server. The branch IAS server will look up the user on the HQ ADservers.
B
What is one method of implementing RADIUS-based VLAN assignment?
A. VSA access lists
B. SSID assignment
C. Roaming profiles
D. VLAN map matrix
B
ABC Corporation, a software development organization, wishes to test their own LDAP implementation in a live wireless environment. Choose the appropriate ways to use LDAP for user authentication in a WLAN environment. (Choose three)
A. A WLAN switch using EAP-TTLS authentication sends a user authentication request to a RADIUS server.
The RADIUS server queries the LDAP server for user credential information.
B. An enterprise wireless gateway (EWG) directly queries the LDAP server for user credential information
C. An access point using PEAPv1/EAP-GTC sends an authentication request to the LDAP server whichproxies the request to a TACACS+ server for user credential authentication
D. A enterprise encryption gateway (EEG) sends an authentication request to an access control server whichproxies the request to a TACACS+ server, which in turn forwards auser credential request to the LDAPserver for verification
A, B, D
The 802.11i-2004 amendment defines and supports what three cipher suites? (Choose three)
A. WEP
B. PSK
C. CCMP
D. TKIP
E. IPSec
F. SSH2
A, C, D