Ccna certification Practice Tests



Download 8,04 Mb.
Pdf ko'rish
bet511/559
Sana28.08.2021
Hajmi8,04 Mb.
#157675
1   ...   507   508   509   510   511   512   513   514   ...   559
Bog'liq
dumpccna 200-301 mavzulashtirilgan test

373

 132.  C.  The router will lock you out since you have not provided a local account to log in with. 

The password recovery procedure would need to be performed if the configuration was 

saved. The enable secret will be overridden by the configuration, since you configured 

default local and it will not work. The console will also not be available because the 

default local was configured. Once the default local is configured, the authentication will 

be based upon the local AAA configuration; if no user exists, then you will be locked out 

of the router or switch.

 133.  A.  Routinely looking at a log file and discovering that a security incident has occurred is 

an example of passive detection. Active detection would be if you were actively notified 

when the incident occurred. Proactive detection is where you find the security incident 

before it occurs. Auditing is the act of reading through a log file, not detecting an incident.



 134.  D.  Remote Authentication Dial-In User Service (RADIUS) servers are authentication 

servers. DNS servers perform name resolution for clients. Email servers deliver and receive 

email on the Internet. Proxy servers fetch requests on behalf of clients.

 135.  B.  Enabling MAC filtering on the access point will allow the devices that she specifies. 

Enabling WPA2 encryption will not prevent unauthorized access to the SOHO network. 

Port Security is enabled on wired network switches to prevent unauthorized access. 

Disabling the SSID from broadcasting will not prevent unauthorized access.



 136.  B.  A certificate infrastructure is required for WPA2-Enterprise mode. WPA2-Enterprise 

mode is not compatible with a pre-shared key (PSK) method of security. 192-bit key 

strength was introduced with WPA3-Enterprise mode. WPA2-Enterprise can be used with 

any of the 802.11 wireless coverage technologies since it operates independently.



 137.  B.  Message Integrity Check (MIC), also known as Michael, is responsible for the 

protection of messages by including an integrity check that the other side can verify. 

Temporal Key Integrity Protocol (TKIP) was used as an encryption protocol for WPA as 

a quick replacement of Wired Equivalent Privacy (WEP). Advanced Encryption Standard 

(AES) is an encryption protocol first introduced with WPA2. A cyclic redundancy check 

(CRC) is a simple calculation to assure that data is not damaged in transit.



 138.  C.  WPA3-Enterprise offers a 192-bit security mode that uses 192-bit minimum strength 

security protocols. Although WPA3-Enterprise can use the authentication encryption 

of 256-bit Galois/Counter Mode Protocol (GCMP-256), it employs 192-bit AES for the 

encryption and transmission of data, which is where it gets its name. All of the other 

options are incorrect.

 139.  C.  After the weaknesses in WEP encryption were discovered, the Wi-Fi Alliance rushed 

the release of the WPA security protocol. The WPA security protocol incorporated the 

802.11i standard of TKIP, which allowed for better integrity of 802.11 transmissions. The 

WPA security protocol was released after the WEP security protocol. The WPA security 

protocol did not address any problems related to coverage. It was not a rebranding of the 

WEP security protocol; it was intended to be a replacement.





Download 8,04 Mb.

Do'stlaringiz bilan baham:
1   ...   507   508   509   510   511   512   513   514   ...   559




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish