Filters
Question type

Which authentication method is considered the most secure wireless authentication method currently available?


A) EAP-FAST
B) PEAP
C) LEAP
D) EAP-TLS

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which WPA version has encryption and MIC with AES and GCMP?


A) WPA
B) WPA2
C) WPA3
D) WPA4

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

One disadvantage of EAP-TLS is which of the following?


A) It's not as secure as other authentication methods.
B) It can be complex to implement.
C) It isn't compatible with many network types.
D) It can only be used in small networks.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which WPA version adds additional features such as Simultaneous Authentication of Equals (SAE) , Forward secrecy, and Protected management frames (PMF) ?


A) WPA
B) WPA2
C) WPA3
D) These features are not in any version of WPA.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

Which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame?


A) MIC
B) KIP
C) OAuth
D) EAP

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following is a wireless authentication method, developed by Cisco, in which authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant?


A) EAP-FAST
B) PEAP
C) EAP-TLS
D) GCMP

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

Which one of the following is the data encryption and integrity method used by WPA2?


A) CCMP
B) GCMP
C) TKIP
D) WIPS

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

A

The original 802.11 standard offered which of the following authentication methods? (Select all that apply.)


A) WPA2
B) LEAP
C) WEP
D) Open Authentication

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?


A) Expanded Authentication Protocol
B) Wireless Security Protocol
C) Extensible Authentication Protocol
D) Multi-security Protocol

E) B) and C)
F) A) and B)

Correct Answer

verifed

verified

Which method of wireless authentication leverages a digital certificate on the AS as a robust method to authenticate the RADIUS server?


A) EAP-FAST
B) EAP
C) PEAP
D) LEAP

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

C

In a scenario using 802.1x and EAP-based authentication, the term supplicant refers to which of the following?


A) The network device that provides access to the network
B) The client device requesting access
C) The device that takes user or client credentials and permits/denies access
D) The wired uplink connection

E) B) and C)
F) None of the above

Correct Answer

verifed

verified

B

The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?


A) Blowfish
B) HMAC
C) AES
D) RC4

E) A) and B)
F) B) and D)

Correct Answer

verifed

verified

Showing 1 - 12 of 12

Related Exams

Show Answer