Wireless Technology Quiz 9
• Question 1
1 out of 1 points
Which of the following are necessary components of a secure wireless connection? (Choose all that apply.)
All of these answers are correct.
• Question 2
2 out of 2 points
A pre-shared key is used in which of the following wireless security configurations?
WPA personal mode
WPA2 personal mode
• Question 3
2 out of 2 points
Which of the following is required to implement MFP on a WLAN to protect both the wireless infrastructure and the client? (Select all that apply.)
Selected Answers: CCXv5
WPA2
• Question 4
1 out of 1 points
Which one of the following authentication methods uses a certificate to authenticate the AS but not the client?
Selected Answer: PEAP
• Question 5
1 out of 1 points
Which one of the following is used as the 802.11 authentication method when 802.1x is used on a WLAN?
Selected Answer: Open authentication
• Question 6
1 out of 1 points
A Cisco WLC is configured for 802.1x authentication, using an external RADIUS server. The controller takes on which one of the following roles?
Selected Answer: Authenticator
• Question 7
2 out of 2 points
Which of the following wireless security methods have been deprecated due to their weaknesses? (Choose all that apply.)
TKIP
WEP
• Question 8
1 out of 1 points
Which one of the following options should you select to configure WPA2 personal on a WLAN?
PSK
• Question 9
1 out of 1 points
WPA2 differs from WPA in which one of the following ways?
Selected Answer: Mandates CCMP
• Question 10
1 out of 1 points
Which one of the following is a wireless encryption method that has been found to be vulnerable and is not recommended for use?
Selected Answer: WEP
• Question 11
1 out of 1 points
Which one of the following is used to protect the integrity of data in a wireless frame?
Selected Answer: MIC
• Question 12
1 out of 1 points
Which one of the following authentication methods requires digital certificates on both the AS and the supplicants?
Selected Answer: EAP-TLS
• Question 13
1 out of 1 points
Which one of the following is currently the most secure data encryption and integrity method for wireless data?
Selected Answer: CCMP
Leave a reply