Module 30 - Wireless Hardening - Q&A Flashcards

1
Q
Which of the following was the first attempt at developing a security protocol for early wireless networks?
A. WPA2
B. WPA
C. WEP
D. RC4
A

C. WEP was the first attempt at developing a security protocol for early wireless networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Which of the following was a temporary protocol developed to bridge the gap between WEP and the IEEE 802.1 li standard?
A.WPA
B. WPA2
C.EAP
D. TKIP
A

A. WPA was a temporary protocol developed to bridge the gap between WEP and the IEEE 802.11i standard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
How many characters can a WPA/WPA2 passphrase be? (Choose two.)
A. 6 or 10 characters
B. 64 hexadecimal characters
C. 8 to 63 ASCII characters
D. 64 ASCII characters
A

B. C. A WPA/WPA2 passphrase can be either 8 to 63 ASCII characters or 64 hexadecimal characters.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Which of the following symmetric algorithms used in wireless protocols uses CCMP mode?
A.AES
B.RC4
C. TKIP
D. WEP
A

A. AES is the symmetric algorithm used in WPA2 that uses CCMP mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
You are trying to set up a wireless network in your enterprise infrastructure and would like to set up secure authentication methods so the wireless network can authenticate to the enterprise wired network. You want to provide for mutual authentication, certificate-based authentication, and centralized directory services. Which of the following combinations would allow you to create such an authentication infrastructure for your wireless network?
A. WPA
B. 802.lX with WPA2 pre-shared keys
C. LEAP
D. 802.1X and EAP
A

D. 802.1X and EAP is the combination that would allow you to create an authentication scheme for the enterprise wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Which of the following protocols creates a secure TLS tunnel?
A.LEAP
B. PEAP
C. 802.1X
D. AES
A

B. PEAP is a form of EAP that creates a secure TLS tunnel to protect its traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Which of the following are not necessarily considered to be secure methods to use when hardening a wireless network? (Choose two.)
A. WPA2-Personal
B. WPA-Enterprise
C. SSID cloaking
D. MAC filtering
A

C. D. Neither SSID cloaking nor MAC filtering are considered to be secure methods to use alone when hardening a wireless network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
All of the following are valid concerns when considering the performance and security of wireless antennas, except.
A. Placement
B. Encryption
C. Type
D. Transmit power
A

B. Encryption is not a valid concern when considering the performance and security of wireless antennas.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Which of the following items should be examined when performing a wireless site survey? (Choose all that apply.)
A. Antenna placement
B. Authentication protocols
C. Physical environment
D. Capacity planning
A

A. C. D. All of these items should be examined when performing a wireless site survey.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Which of the following configuration settings must match on all wireless devices in order for them to communicate securely? (Choose two.)
A. Authentication
B. Encryption
C. Power levels
D. MAC address
A

A, B. Authentication and encryption settings must match on all wireless devices in a wireless network in order for them to communicate securely.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly