SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
CWNA 802.11 Network Security
Start Test
Study First
Subjects
:
cisco
,
it-skills
,
cwna
Instructions:
Answer 26 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. Is a secuirty concept. Authorization involves granting access to network resources and services. Before authorization to network resources can be granted - proper authentication must occur. Authentication is the verification of user identity and cred
Supplicant
Authorization - Authentication and Accounting (AAA)
preshared keys (PSKs)
Initialization Vector (IV)
2. TKIP is an enhancement of WEP encryption that address many of the known weaknesses of WEP. TKIP starts with a 128-bit temporal key that is combined with a 48-bit Initialization Vector (IV) and source and destination MAC addresses in a complicated pro
robust security network associations (RSNAs)
transition security network (TSN)
RC4
Temporal Key Integrity Protocol (TKIP)
3. As defined by the 802.11i security amendment - two stations (STAs) must establish a procedure to authenticate an associate with each other as well as create dynamic encryption keys through a process known as 4-Way Handshake. This association between
robust security network (RSN)
Microsoft Point-to-Point encryption (MPPE)
robust security network associations (RSNAs)
Authenticator
4. An 802.11 wireless network that allows for the creation of pre-robust security network associations (pre-RSNAs) as well as RSNAs is known as a transition security network. A TSN supports 802.11i-defined security as well as legacy security such as WEP
Internet Protocol Secuirty (IPsec)
Advanced Encryption Standard (AES)
Initialization Vector (IV)
transition security network (TSN)
5. RBAC is an approach to restricting system access to authorized users. The three main components of RBAC approach are users - roles and permissions. Separate roles can be created such as the sales role or marketing role. Individuals or groups of users
role-base access control (RBAC)
Wi-Fi Protected Access (WPA)
Microsoft Point-to-Point encryption (MPPE)
RC4
6. The 802.1X standard defines port-based access control. 802.1X provides an authorization framework that allows or disallows traffic to pass through a port and thereby access network resources. 802.1X defines two virtual ports: an uncontrolled port and
Message Integrity Check (MIC)
Authorization - Authentication and Accounting (AAA)
port-based access control
Supplicant
7. Is a Layer 3 VPN technology. IPsec can use RC4 - DES - 3DES and AES ciphers for encryption. It provides for encryption - encapsulation - data integrity - and device authnetication.
Initialization Vector (IV)
MAC Service Data Unit (MSDU)
Internet Protocol Secuirty (IPsec)
4 - Way Handshake
8. Algorithm is a streaming cipher used in technologies that are often used to protect Internet traffic - such as Secure Sockets Layer (SSL). The RC4 algorithm is used to protect 802.11 wireless data and is incorporated into two encryption methods known
port-based access control
RC4
Extensible Authentication Protocol (EAP)
transition security network (TSN)
9. The MSDU contains data from the LLC and layers 3-7. A simple definition of MSDU is the data payload that contains the IP packet plus some LLC data.
Authentication Server (AS)
MAC Service Data Unit (MSDU)
Extensible Authentication Protocol (EAP)
Internet Protocol Secuirty (IPsec)
10. After an EAP frame exchange where mutal authentication is required - both the AS and the supplicant known infomration about each other because of the exchanging of credentials. This newfound information is used as seeding material or keying material
Authenticator
port-based access control
per session per user
Temporal Key Integrity Protocol (TKIP)
11. The AES algorithm - orginally named Rijandael Aligorithm - is a block cipher that offers much stronger protection than the RC4 Streaming cipher. AES is used to encrypt 802.11 wireless data by using an encryption method known as Counter mode with Ciph
Microsoft Point-to-Point encryption (MPPE)
RC4
Advanced Encryption Standard (AES)
transition security network (TSN)
12. Prior to the ratification of the 802.11i amendment - the Wi-Fi alliance introduced WPA certification as a snapshot of the not yet released 802.11i amendment - supporting only the TKIP/RC4 dynamic encryption key mangement. 802.1X/EAP authentication wa
Wired Equivalent Privacy (WEP)
Message Integrity Check (MIC)
role-base access control (RBAC)
Wi-Fi Protected Access (WPA)
13. A robust security network (RSN) is a network that only allows for the creation of robust secuirty network associations (RSNAs). An RSN utilizes CCMPAES encryption as well as 802.1X/EAP authentication
Message Integrity Check (MIC)
robust security network (RSN)
Extensible Authentication Protocol (EAP)
role-base access control (RBAC)
14. WEP is a layer 2 encryption method that uses the RC4 streaming cipher. The orginal 802.11 standard defined 64-bit and 128-bit WEP. WEP encryption has been cracked and is not considered a strong encryption method.
Wired Equivalent Privacy (WEP)
port-based access control
preshared keys (PSKs)
Authentication Server (AS)
15. The default encryption method defined under 802.11i amendment. This method uses the AES Cipher. CCMP/AES uses a 128-bit encryption key size and encrypts in 128-bit fixed-length blocks. An 8-byte Message Integrity Check is used that is considered much
MAC Service Data Unit (MSDU)
Counter Mode with Cipher Block Chaining Message Authentication Code (CCMP)
Wi-Fi Protected Access 2 (WPA2)
Wi-Fi Protected Access (WPA)
16. MPPE is a 128-bit encryption method that uses the RC4 algorithm. MPPE is used with P2P tunneling protocol (PPTP) VPN technology.
Extensible Authentication Protocol (EAP)
Message Integrity Check (MIC)
Supplicant
Microsoft Point-to-Point encryption (MPPE)
17. Is based on security mechanisms that were orginally defined in the IEEE 802.11i amendment defining a robust security network (RSN). 2 versions of WPA2 exist. WPA2-personal defines security for a small office - home office SOHO ennvironment - and WPA2
Wi-Fi Protected Access 2 (WPA2)
Advanced Encryption Standard (AES)
Point-to-Point Tunneling Protocol (PPTP)
port-based access control
18. TKIP uses a data integrity check known as Message Integrity Check (MIC) to mitigate known bit-flipping attacks against WEP. The MIC is sometimes referred to by the nickname Micheal.
4 - Way Handshake
Message Integrity Check (MIC)
Internet Protocol Secuirty (IPsec)
Wi-Fi Protected Access 2 (WPA2)
19. Under the 802.11i amendment - two stations (STAs) must establish a procedure to authenticate and associate with each other as well as create dynamic encryption keys through a process known as the 4-Way Handshake.
4 - Way Handshake
Internet Protocol Secuirty (IPsec)
Advanced Encryption Standard (AES)
per session per user
20. When an 802.1X/EAP solution is deployed - a device that blocks or allows traffic to pass through its port secuirty is known as the authenticator. Authentication traffic is normally allowed to pass through the authenticator while all other traffic is
Authorization - Authentication and Accounting (AAA)
Point-to-Point Tunneling Protocol (PPTP)
Wi-Fi Protected Access 2 (WPA2)
Authenticator
21. When an 802.1X/EAP solution is deployed - a host with software that is requesting authentication and access to network resources is known as the supplicant
4 - Way Handshake
port-based access control
Supplicant
role-base access control (RBAC)
22. Extensible Authentication Protocol (EAP) is used to provide user authentication for an 802.1X port-based access control solution. EAP is a flexable layer 2 authentication protocol that resides under P2P protocol (PPP)
Extensible Authentication Protocol (EAP)
Wi-Fi Protected Access 2 (WPA2)
per session per user
robust security network associations (RSNAs)
23. When 802.1X/EAP solution is deployed - an authentication server validates the credentials of the supplicant that is requesting access and notifies the authenticator that the supplicant has been authorized. The authentication server will maintain a us
per session per user
Authentication Server (AS)
Wi-Fi Protected Access (WPA)
RC4
24. The IV is utilized by the RC4 steaming chipher that WEP encryption uses. The IV is a block of 24 bits that is combined with a static key. It is sent in cleartext and is different on every frame. The effective key strength of combining the IV with the
Temporal Key Integrity Protocol (TKIP)
preshared keys (PSKs)
RC4
Initialization Vector (IV)
25. A method of distributing encryption passphrases or keys by manually typing the matching passphrases or keys on both the access point and all client stations that will need to be able to associate to the wireless network. This information is shared ah
RC4
Authorization - Authentication and Accounting (AAA)
preshared keys (PSKs)
port-based access control
26. PPTP is a layer 3 VPN technology. It uses 128-bit Microsoft point-to-point encryption (MPPE) - which uses the RC4 algorithm. MPPE encryption is considered adequate but not strong. PPTP also uses MS-CHAP version 2 for user authentication - which is su
Point-to-Point Tunneling Protocol (PPTP)
4 - Way Handshake
Wi-Fi Protected Access (WPA)
robust security network (RSN)
Sorry!:) No result found.
Can you answer 50 questions in 15 minutes?
Let me suggest you:
Browse all subjects
Browse all tests
Most popular tests
Major Subjects
Tests & Exams
AP
CLEP
DSST
GRE
SAT
GMAT
Certifications
CISSP go to https://www.isc2.org/
PMP
ITIL
RHCE
MCTS
More...
IT Skills
Android Programming
Data Modeling
Objective C Programming
Basic Python Programming
Adobe Illustrator
More...
Business Skills
Advertising Techniques
Business Accounting Basics
Business Strategy
Human Resource Management
Marketing Basics
More...
Soft Skills
Body Language
People Skills
Public Speaking
Persuasion
Job Hunting And Resumes
More...
Vocabulary
GRE Vocab
SAT Vocab
TOEFL Essential Vocab
Basic English Words For All
Global Words You Should Know
Business English
More...
Languages
AP German Vocab
AP Latin Vocab
SAT Subject Test: French
Italian Survival
Norwegian Survival
More...
Engineering
Audio Engineering
Computer Science Engineering
Aerospace Engineering
Chemical Engineering
Structural Engineering
More...
Health Sciences
Basic Nursing Skills
Health Science Language Fundamentals
Veterinary Technology Medical Language
Cardiology
Clinical Surgery
More...
English
Grammar Fundamentals
Literary And Rhetorical Vocab
Elements Of Style Vocab
Introduction To English Major
Complete Advanced Sentences
Literature
Homonyms
More...
Math
Algebra Formulas
Basic Arithmetic: Measurements
Metric Conversions
Geometric Properties
Important Math Facts
Number Sense Vocab
Business Math
More...
Other Major Subjects
Science
Economics
History
Law
Performing-arts
Cooking
Logic & Reasoning
Trivia
Browse all subjects
Browse all tests
Most popular tests