Ccna certification Practice Tests


  Appendix  ■   Answers to Practice Test Questions  140



Download 8,04 Mb.
Pdf ko'rish
bet512/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   508   509   510   511   512   513   514   515   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

374

 

Appendix 



  Answers to Practice Test Questions



 140.  B.  The 802.11i standard added the feature of per-frame encryption. The use of certificates 

and pre-shared keys (PSKs) are features of WPA and not the 802.11i standard. CRC 

checking is part of the 802.11 standard, and therefore, it was not added with 802.11i or 

the WPA security protocol.



 141.  C.  The 802.11i (WPA2) specification introduced a specific mode of Advanced Encryption 

Standard (AES) encryption called Counter Mode with Cipher Block Chaining Message 

Authentication Code Protocol (CCMP). The Rivest Cipher 4 (RC4) algorithm is used by 

Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) as an encryption 

protocol. Message-Digest algorithm 5 (MD5) and Secure Hash Algorithm 1 (SHA1) are 

popular hashing algorithms but not related to wireless communications.



 142.  The WPA3 protocol introduced the feature of Simultaneous Authentication of Equals 

(SAE) authentication, also known as the Dragonfly handshake. Certificate support, 

per-frame encryption, and Temporal Key Integrity Protocol (TKIP) were all features 

introduced with the original WPA standard.



 143.  B.  When configuring WAP2-Enterprise mode on a wireless LAN controller, you must 

configure a RADIUS server for authentication of the users or computers joining wireless. 

Setting a Network Time Protocol server is optional when configuring WPA2-Enterprise. 

WPA-Personal uses a pre-shared key (PSK), whereas WPA-Enterprise uses a certificate pair 

for authentication. Captive portals are not required for WPA2-Enterprise because the user 

or computer should be authenticated by the certificate pair.



 144.  C.  You should disable the Temporal Key Integrity Protocol (TKIP) when configuring 

WPA2. This will ensure that the WAP and client do not fall back to the older WPA 

protocol. 802.1X will operate independently from the WPA2 and WPA fallback 

mechanism. Advanced Encryption Standard (AES) is an encryption protocol that is used 

in conjunction with WPA2; therefore, it should not be disabled. MAC filtering is not 

related to WPA or WPA2 and works independently as a security mechanism.



 145.  A.  A pre-shared key (PSK) is the mechanism used for configuring authentication with 

WPA2 using a symmetrical key. Advanced Encryption Standard (AES) is an encryption 

protocol that is used in conjunction with WPA2. AES is not used for authentication of 

hosts. Certificates are used with WPA2-Enterprise; they are asymmetrical keys used for 

authentication. The Temporal Key Integrity Protocol (TKIP) is used alongside the RC4 

protocol to provide encryption for WPA; it is not used for authentication.



 146.  D.  When the status of a configured WLAN is set to disable or unchecked in the GUI, 

the SSID will be broadcast and active for clients. SSID beaconing is enabled by default; 

if it were disabled, the clients would not see the SSID. Multicast support is used for 

multimedia applications and would not prevent the SSID from being seen by clients. The 

Radio Policy could possibly restrict clients from seeing the SSID depending on what it is 

set to. However, when it is set to all, there are no restrictions.



 147.  A.  A single pre-shared key (PSK) is configured for a WPA2 WLAN. The PSK can be either 

one hex or one ASCII key, but it cannot be both. If you need multiple keys, then WPA2-

Enterprise should be used. Keep in mind that a PSK is symmetrical encryption, whereas 

WPA2-Enterprise uses certificates and asymmetrical encryption. All of the other options 

are incorrect.



Chapter 6: Automation and Programmability (Domain 6) 


Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   508   509   510   511   512   513   514   515   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish