Exam 28: Securing Wireless Networks
Exam 1: Introduction to TCP/IP Networking17 Questions
Exam 2: Fundamentals of Ethernet Lans22 Questions
Exam 3: Fundamentals of Wans and IP Routing8 Questions
Exam 4: Using the Command-Line Interface15 Questions
Exam 5: Analyzing Ethernet Lan Switching15 Questions
Exam 6: Configuring Basic Switch Management15 Questions
Exam 7: Configuring and Verifying Switch Interfaces7 Questions
Exam 8: Implementing Ethernet Virtual Lans16 Questions
Exam 9: Spanning Tree Protocol Concepts17 Questions
Exam 10: RSTP and Etherchannel Configuration20 Questions
Exam 11: Perspectives on IPV4 Subnetting26 Questions
Exam 12: Analyzing Classful IPV4 Networks15 Questions
Exam 13: Analyzing Subnet Masks19 Questions
Exam 14: Analyzing Existing Subnets29 Questions
Exam 15: Operating Cisco Routers15 Questions
Exam 16: Configuring IPV4 Addresses and Static Routes11 Questions
Exam 17: IP Routing in the Lan15 Questions
Exam 18: Troubleshooting IPV4 Routing7 Questions
Exam 19: Understanding OSPF Concepts17 Questions
Exam 20: Implementing OSPF19 Questions
Exam 21: OSPF Network Types and Neighbors15 Questions
Exam 22: Fundamentals of IP Version 614 Questions
Exam 23: Ipv6 Addressing and Subnetting14 Questions
Exam 24: Implementing IPV6 Addressing on Routers15 Questions
Exam 25: Implementing IPV6 Routing14 Questions
Exam 26: Fundamentals of Wireless Networks12 Questions
Exam 27: Analyzing Cisco Wireless Architectures12 Questions
Exam 28: Securing Wireless Networks12 Questions
Exam 29: Building a Wireless Lan12 Questions
Select questions type
In a scenario using 802.1x and EAP-based authentication, the term supplicant refers to which of the following?
Free
(Multiple Choice)
5.0/5
(35)
Correct Answer:
B
Which one of the following is the data encryption and integrity method used by WPA2?
Free
(Multiple Choice)
4.8/5
(31)
Correct Answer:
A
Which method of wireless authentication leverages a digital certificate on the AS as a robust method to authenticate the RADIUS server?
Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
C
What is the name of the protocol that defines a set of common functions that actual authentication methods can use to authenticate users?
(Multiple Choice)
4.8/5
(33)
Which of the following is a wireless authentication method, developed by Cisco, in which authentication credentials are protected by passing a protected access credential (PAC) between the AS and the supplicant?
(Multiple Choice)
4.8/5
(36)
Which WPA version adds additional features such as Simultaneous Authentication of Equals (SAE), Forward secrecy, and Protected management frames (PMF)?
(Multiple Choice)
4.8/5
(32)
Which of the following is a security tool that can help prevent against data tampering by sending a secret stamp inside of an encrypted data frame?
(Multiple Choice)
4.9/5
(32)
The Wired Equivalent Privacy (WEP) uses which encryption algorithm to encrypt data?
(Multiple Choice)
4.9/5
(34)
Which authentication method is considered the most secure wireless authentication method currently available?
(Multiple Choice)
4.9/5
(27)
The original 802.11 standard offered which of the following authentication methods? (Select all that apply.)
(Multiple Choice)
4.9/5
(44)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)