Wireless Secuirty Flashcards

1
Q

Which of the following specifications identify security that can be added to wireless networks ? Select two

  1. 5
  2. 11a
  3. 3
  4. 1x
  5. 11i
  6. 2
A
  1. 1x

802. 11i

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

You want to implement 802.1x authentication on your wireless network. Where would you configure passwords that are used for authentication?

  • On a RADIOUS server
  • On the wireless access point
  • On the wireless access point and each wireless device
  • On a certificate authority (CA)
A

On a RADIOUS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What encryption method is used by WPA for wireless networks?

IPsec
WEP
TKIP
AES
802.1x
A

TKIP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

You want to implement 802.1x authentication on your wireless network. Which of the following will be required?

WPA
WPA2
RADIOUS
TKIP

A

RADIOUS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following wireless security methods use a common shared ket configured on the wireless access point and all wireless clients?

  • WPA Enterprise and WPA2 Enterprise
  • WEP, WPA Personal, and WPA2 Personal
  • WEP, WPA Personal, WPA Enterprise, WPA2 Personal, and WPA2 Enterprise
  • WEP
A

-WEP, WPA Personal, and WPA2 Personal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

On Wireless networks, which technology is employed to provide the same type of protection that cables provide on a wired network?

  • SSL
  • WEP
  • L2TP
  • TACACS
  • WPP
A

WEP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

You need to add security for your wireless network. You would like to use the most secure method.

Which method should you implement?

WEP
Kerberos
WPA2
WPA

A

WPA2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following protocols or mechanisms is not used to provide security on a wireless network?

  • WPA
  • 802.1x
  • RDP
  • IPSec
A

RDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

On a wireless network that is employing WEP, which type of users are allowed to authenticate through the access points?

  • Users with the correct WEP key
  • Only users with the remote access privileges
  • Users within 80% strength radius
  • Users with proper company IDs
A

Users with the correct WEP key

How well did you know this?
1
Not at all
2
3
4
5
Perfectly