373
132. C. The router will lock you out since you have not provided a local account to log in with.
The password recovery procedure would need to be performed if the configuration was
saved. The enable secret will be overridden by the configuration, since you configured
default local and it will not work. The console will also not be available because the
default local was configured. Once the default local is configured, the authentication will
be based upon the local AAA configuration; if no user exists, then you will be locked out
of the router or switch.
133. A. Routinely looking at a log file and discovering that a security incident has occurred is
an example of passive detection. Active detection would be if you were actively notified
when the incident occurred. Proactive detection is where you find the security incident
before it occurs. Auditing is the act of reading through a log file, not detecting an incident.
134. D. Remote Authentication Dial-In User Service (RADIUS) servers are authentication
servers. DNS servers perform name resolution for clients. Email servers deliver and receive
email on the Internet. Proxy servers fetch requests on behalf of clients.
135. B. Enabling MAC filtering on the access point will allow the devices that she specifies.
Enabling WPA2 encryption will not prevent unauthorized access to the SOHO network.
Port Security is enabled on wired network switches to prevent unauthorized access.
Disabling the SSID from broadcasting will not prevent unauthorized access.
136. B. A certificate infrastructure is required for WPA2-Enterprise mode. WPA2-Enterprise
mode is not compatible with a pre-shared key (PSK) method of security. 192-bit key
strength was introduced with WPA3-Enterprise mode. WPA2-Enterprise can be used with
any of the 802.11 wireless coverage technologies since it operates independently.
137. B. Message Integrity Check (MIC), also known as Michael, is responsible for the
protection of messages by including an integrity check that the other side can verify.
Temporal Key Integrity Protocol (TKIP) was used as an encryption protocol for WPA as
a quick replacement of Wired Equivalent Privacy (WEP). Advanced Encryption Standard
(AES) is an encryption protocol first introduced with WPA2. A cyclic redundancy check
(CRC) is a simple calculation to assure that data is not damaged in transit.
138. C. WPA3-Enterprise offers a 192-bit security mode that uses 192-bit minimum strength
security protocols. Although WPA3-Enterprise can use the authentication encryption
of 256-bit Galois/Counter Mode Protocol (GCMP-256), it employs 192-bit AES for the
encryption and transmission of data, which is where it gets its name. All of the other
options are incorrect.
139. C. After the weaknesses in WEP encryption were discovered, the Wi-Fi Alliance rushed
the release of the WPA security protocol. The WPA security protocol incorporated the
802.11i standard of TKIP, which allowed for better integrity of 802.11 transmissions. The
WPA security protocol was released after the WEP security protocol. The WPA security
protocol did not address any problems related to coverage. It was not a rebranding of the
WEP security protocol; it was intended to be a replacement.
Do'stlaringiz bilan baham: |