Register Now

Login

Lost Password

Lost your password? Please enter your email address. You will receive a link and will create a new password via email.

Login

Register Now

Welcome to All Test Answers

Wireless Technology Quiz 9

• Question 1
1 out of 1 points

Which of the following are necessary components of a secure wireless connection? (Choose all that apply.)
All of these answers are correct.

• Question 2
2 out of 2 points

A pre-shared key is used in which of the following wireless security configurations?
WPA personal mode
WPA2 personal mode

• Question 3
2 out of 2 points

Which of the following is required to implement MFP on a WLAN to protect both the wireless infrastructure and the client? (Select all that apply.)
Selected Answers: CCXv5
WPA2

• Question 4
1 out of 1 points

Which one of the following authentication methods uses a certificate to authenticate the AS but not the client?
Selected Answer: PEAP

• Question 5
1 out of 1 points

Which one of the following is used as the 802.11 authentication method when 802.1x is used on a WLAN?
Selected Answer: Open authentication

• Question 6
1 out of 1 points

A Cisco WLC is configured for 802.1x authentication, using an external RADIUS server. The controller takes on which one of the following roles?
Selected Answer: Authenticator

• Question 7
2 out of 2 points

Which of the following wireless security methods have been deprecated due to their weaknesses? (Choose all that apply.)
TKIP
WEP

• Question 8
1 out of 1 points

Which one of the following options should you select to configure WPA2 personal on a WLAN?
PSK

• Question 9
1 out of 1 points

WPA2 differs from WPA in which one of the following ways?
Selected Answer: Mandates CCMP

• Question 10
1 out of 1 points

Which one of the following is a wireless encryption method that has been found to be vulnerable and is not recommended for use?
Selected Answer: WEP

• Question 11
1 out of 1 points

Which one of the following is used to protect the integrity of data in a wireless frame?
Selected Answer: MIC

• Question 12
1 out of 1 points

Which one of the following authentication methods requires digital certificates on both the AS and the supplicants?
Selected Answer: EAP-TLS

• Question 13
1 out of 1 points

Which one of the following is currently the most secure data encryption and integrity method for wireless data?
Selected Answer: CCMP

About

Leave a reply

Captcha Click on image to update the captcha .

error: Content is protected !!