PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 1

Which of the following are secure device management protocols?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • SNMPv3
  • HTTP
  • HTTPS
  • SSH

Answer : SNMPv3 HTTPS SSH

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 4

Which of the following keys are used by the public key infrastructure (PKI)?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Group Temporal Key
  • Public Key
  • Private Key
  • Pairwise Transient Key

Answer : Public Key Private Key

Which of the following is a type of malware that is secretly installed on the user's personal computer and collects users' information without their knowledge?


Options are :

  • Virus
  • Worm
  • Spyware
  • Adware

Answer : Spyware

Which of the following is a wireless device that is created to allow a cracker to conduct a man-in-the-middle attack?


Options are :

  • Protocol analyzer
  • WLAN controller
  • Lightweight Access Point
  • Rogue access point

Answer : Rogue access point

PW0-104 Wireless LAN Administration Certified Practice Exam Set 4

Which of the following are secure infrastructure management protocols used in WLAN?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Telnet
  • HTTPS
  • SNMPv3
  • SCP

Answer : HTTPS SNMPv3 SCP

Which of the following tools monitors the radio spectrum for the presence of unauthorized, rogue access points and the use of wireless attack tools?


Options are :

  • WIPS
  • IDS
  • Snort
  • Firewall

Answer : WIPS

You work as a Network Administrator for Tech Perfect Inc. The company has a secure wireless network. Since the company's wireless network is so dynamic, it requires regular auditing to maintain proper security. For this reason, you are configuring NetStumbler as a wireless auditing tool. What services can NetStumbler provide? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Detection of causes of wireless interference
  • Detection of unauthorized ("rogue") access points
  • Verification of network configurations
  • Capturing and decoding of packets

Answer : Detection of causes of wireless interference Detection of unauthorized ("rogue") access points Verification of network configurations

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 2

Which of the following protocols are types of VPN protocols?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • L2TP
  • PEAP
  • IPSec
  • PPTP

Answer : L2TP IPSec PPTP

Which of the following wireless security features provides the best wireless security mechanism?


Options are :

  • WPA with Pre Shared Key
  • WPA with 802.1X authentication
  • WEP
  • WPA

Answer : WPA with 802.1X authentication

You work as a Network Administrator for NetTech Inc. The company has a Windows 2003 domain-based network. The company has a main office and several branch offices. You want to centralize theadministration. Therefore, you implement a Remote Authentication Dial-In Service (RADIUS) server. Each branch office supports its own Routing and Remote Access Server. You remove the default remote access policy, as you want to secure communications and implement a single policy that requires all dial-up communications to use a 40-bit encryption. What will you do to accomplish this?Each correct answer represents a part of the solution. Choose two.


Options are :

  • Set the level of encryption to Basic in the remote access policy.
  • Set the level of encryption to No Encryption in the remote access policy.
  • Create a remote access policy on the RADIUS server.
  • Create a remote access policy on the Routing and Remote Access Server of each branch office.

Answer : Set the level of encryption to Basic in the remote access policy. Create a remote access policy on the RADIUS server.

CWNA-106 Certified Wireless Network Administrator Exam Set 1

Radios on AP are turned off, and the AP listens for ARP messages on a wired network. The controller generates an alarm if an ARP is heard on a wired LAN. In which mode does the AP operate if this task is performed?


Options are :

  • Sniffer mode
  • Local mode
  • Monitor mode
  • Rogue detection mode

Answer : Rogue detection mode

Which of the following are tunneling protocols used in a virtual private network (VPN)?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • PPTP
  • MD5
  • L2TP
  • SCP

Answer : PPTP L2TP

Which of the following protocols uses separate control and data connections between the client and server applications?


Options are :

  • SMTP
  • SCP
  • FTP
  • HTTP

Answer : FTP

PW0-104 Wireless LAN Administration Certified Practice Exam Set 2

On which of the following, digital signatures are based?Each correct answer represents a complete solution. Choose two.


Options are :

  • RADIUS
  • Asymmetric encryption
  • Hashing functions
  • Symmetric encryption

Answer : Asymmetric encryption Hashing functions

Which of the following protocols is used for authentication in an 802.1X framework?


Options are :

  • EAP
  • L2TP
  • TKIP
  • IPSec

Answer : EAP

Which of the following components are normally required to secure wireless 802.11 networks?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Authentication
  • Accessibility
  • Segmentation
  • Strong encryption

Answer : Authentication Segmentation Strong encryption

PW0-104 Wireless LAN Administration Certified Practice Exam Set 4

Which of the following security protocols uses a single, manually configured, static key for data encryption that is shared by the client and the WAP?


Options are :

  • L2TP
  • WEP
  • WPA
  • IPSec

Answer : WEP

Which of the following protocols is used by Point-to-Point (PPP) servers to validate the identity of remote clients?


Options are :

  • IPSec
  • CHAP
  • EAP-TTLS
  • PPP

Answer : CHAP

Which of the following is designed to detect bit-flipping and forgery attacks that are used against WEP?


Options are :

  • Initialization vector (IV)
  • Cyclic redundancy check (CRC)
  • Message integrity code (MIC)
  • Message authentication code (MAC)

Answer : Message integrity code (MIC)

CWNA-106 Certified Wireless Network Administrator Exam Set 1

Which of the following keys is derived from a preshared key and Extensible Authentication Protocol (EAP)?


Options are :

  • Pairwise Transient Key
  • Private Key
  • Pairwise Master Key
  • Group Temporal Key

Answer : Pairwise Master Key

A Cisco Unified Wireless Network has an access point (AP) that provides a single point of management and reduces the security concern of a stolen access point. Which type of access point has this characteristic?


Options are :

  • Lightweight AP
  • Rouge AP
  • Autonomous AP
  • LWAPP

Answer : Lightweight AP

Which of the following are attacks/techniques related to Wired Equivalent Privacy (WEP)?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Phishing
  • Bit-flipping attack
  • Weak key
  • Baiting

Answer : Bit-flipping attack Weak key

CWNA-106 Certified Wireless Network Administrator Exam Set 1

Which of the following security protocols is required by Robust Security Network (RSN)?


Options are :

  • IPSec
  • SSL
  • SCP
  • CCMP

Answer : CCMP

Which of the following protocols ensures that all relevant information is delivered to the correct access point to which the client station is associated?


Options are :

  • CHAP
  • PPP
  • IAPP
  • MS-CHAP

Answer : IAPP

Which of the following is a security access control technique that allows or prevents specific network devices from accessing the network?


Options are :

  • MAC filtering
  • Packet filtering
  • Ingress filtering
  • Route filtering

Answer : MAC filtering

PW0-105 Certified Wireless Network Administrator Exam Set 3

Which of the following are software applications designed to track a user's personal information with the intent to pass it on to third parties without the user's permission?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Stealware
  • Adware
  • Spyware
  • Zombie

Answer : Adware Spyware

Which of the following is the most secure protocol used for encryption in a wireless network?


Options are :

  • IPSec
  • WPA2
  • WPA
  • WEP

Answer : WPA2

Which of the following types of attacks come under the category of hacker attacks?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • IP address spoofing
  • Teardrop
  • Smurf
  • Password cracking

Answer : IP address spoofing Password cracking

PW0-104 Wireless LAN Administration Certified Practice Exam Set 1

Which of the following is a passive device that views the current content of the packet traveling on the network?


Options are :

  • WLAN controller
  • Rogue AP
  • Spectrum analyzer
  • Protocol analyzer

Answer : Protocol analyzer

Which of the following are the main components of a Wi-Fi Protected Setup (WPS) protocol architecture?Each correct answer represents a part of the solution. Choose all that apply.


Options are :

  • Enrollee
  • Supplicant
  • Authenticator
  • Registrar

Answer : Enrollee Authenticator Registrar

Which of the following attacks fall into the category of hacker attacks? Each correct answer represents a complete solution. Check all that apply.


Options are :

  • Teardrop
  • IP address spoofing
  • Smurf
  • password cracking

Answer : IP address spoofing password cracking

Which of the following provides the best protection against man-in-the-middle attack?


Options are :

  • strong encryption
  • party wall
  • Fiber optic cable
  • strong password
  • None

Answer : strong encryption

PW0-104 Wireless LAN Administration Practice Exam Set 1

Which of the following security methods can be used to detect a DoS attack, in order to improve the safety of the network?


Options are :

  • WLAN controller
  • protocol analyzer
  • spectrum analyzer
  • None
  • WIPS

Answer : WIPS

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions