MF Wireless LAN Security Quiz Answers

MF Wireless LAN Security Quiz Answers

  1. What interferer can be seen using the Cisco CleanAir technology?

    • Manipulated Management Frames
    • Microwave ovens
    • Rogue APs
    • Co-channel interference
  2. What authentication method would you choose if your guest users need to be greeted with a splash page and login request?

    • Pre-share key
    • Local EAP
    • Web Authentication
    • MAC Filtering
  3. What attacks does Management Frame Protection help to mitigate? (Choose 2)

    • Denial-of-service
    • Man-in-the-Middle
    • War driving
    • Reconnaissance
    • Eavesdropping
  4.  What device is used as the Authentication Server in an 802.1X implementation?

    • Wireless client
    • Ethernet switch
    • Application Server
    • Access point
    • RADIUS Server
  5. When a wireless intrusion prevention system (WIPS) floods a rogue AP with de-authenticate messages, what is the possible reason?

    • Inhibit communication between the rogue AP and legitimate stations.
    • Prevent unauthorized clients from communicating with the rogue AP.
    • Locate the rogue AP so that it can be removed.
    • Prevent the rogue AP from communicating with the wired network.
  6. Which authentication methods are most commonly used in Enterprise wireless deployments? (Choose 3)

    • EAP-FAST
    • CCKM
    • PEAP
    • AES
    • EAP-TLS
    • WEP
  7. With ______​Passive_____ scanning a wireless device listens for a beacon frame for a set period of time. Once the device receives a beacon frame and the SSID, it can then attempt to join the network.

    Note: You should type “Passive” with our system test. but for the test at netacad you can type “Passive” or “passive”. Both are correct. Non case sensitive for netacad testing system

  8. The two primary security vulnerabilities of the original 802.11 wireless security mechanism are

    • Authenication
    • Access speed
    • Access codes
    • Encryption
    • Management frames
  9.  The ___EAP__ is an “envelope” that can carry many different kinds of exchange data used for authentication, such as a challenge/response, one-time passwords, and digital certificates.

    Noted: Type “EAP” in our test system. With netacad system, you can type any one of the following:

    • EAP
      eap
      extensible authentication protocol
      Extensible Authentication Protocol