PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 4

Which of the following encryption algorithms is used by Wired Equivalent Privacy (WEP)?


Options are :

  • TKIP
  • RSA
  • RC4
  • CCMP

Answer : RC4

You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?


Options are :

  • Implement a firewall.
  • Implement a WIPS.
  • Implement a dynamic NAT.
  • Implement an ACL.

Answer : Implement a WIPS.

Which of the following keys are used by the symmetric key algorithm?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Public Key
  • Private Key
  • Group Temporal Key
  • Pairwise Transient Key

Answer : Private Key

PW0-104 Wireless LAN Administration Certified Practice Exam Set 4

Which of the following keys is derived from Group Master Key (GMK)?


Options are :

  • Public Key
  • Pairwise Transient Key
  • Private Key
  • Group Temporal Key

Answer : Group Temporal Key

Which of the following are the types of password guessing attacks?Each correct answer represents a complete solution. Choose two.


Options are :

  • Dictionary attack
  • Man-in-the-middle attack
  • Password attack
  • Brute force attack

Answer : Dictionary attack Brute force attack

Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?


Options are :

  • Spoofing
  • Phishing
  • Replay attack
  • Password guessing attack

Answer : Phishing

PW0-104 Wireless LAN Administration Practice Exam Set 3

Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?


Options are :

  • WEP
  • IPSec
  • WAP
  • L2TP

Answer : WEP

Which of the following attacks is used to obtain a user's authentication credentials?


Options are :

  • Phishing attack
  • Brute force attack
  • Bonk attack
  • Teardrop attack

Answer : Brute force attack

Which of the following are the three main intended goals of WEP encryption?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Authentication
  • Access control
  • Data integrity
  • Confidentiality

Answer : Access control Data integrity Confidentiality

PW0-105 Certified Wireless Network Administrator Exam Set 3

You work as a network administrator for Web Perfect Inc. You configure both WPA and EAP authentications on a client computer in the company's wireless network. Where will the encryption key be located during the active user session? Each correct answer represents a part of the solution. Choose two.


Options are :

  • Shared with all clients in the network
  • On the controller
  • On the client
  • On the AP

Answer : On the client On the AP

You are the Administrator for a corporate network. You are concerned about denial of service attacks. Which of the following would be the most help against Denial of Service (DOS) attacks?


Options are :

  • Stateful Packet Inspection (SPI) firewall
  • Honey pot
  • Packet filtering firewall
  • Network surveys.

Answer : Stateful Packet Inspection (SPI) firewall

Which of the following are NOT steps in securing your wireless connection?Each correct answer represents a complete solution. Choose two.


Options are :

  • Using either WEP or WPA encryption
  • MAC filtering on the router
  • Hardening the server OS
  • Not broadcasting SSID
  • Strong password policies on workstations.

Answer : Hardening the server OS Strong password policies on workstations.

PW0-204 Certified Wireless Security Professional (CWSP) Exam Set 4

Which of the following does PEAP use to authenticate the user inside an encrypted tunnel?Each correct answer represents a complete solution. Choose two.


Options are :

  • RC4
  • AES
  • GTC
  • MS-CHAP v2

Answer : GTC MS-CHAP v2

Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?


Options are :

  • CHAP
  • EAP
  • EAP-TLS
  • PEAP

Answer : CHAP

Which of the following is an application protocol that is used to query and modify data using directory services running over TCP/IP?


Options are :

  • LDAP
  • HTTP
  • RBAC
  • LEAP

Answer : LDAP

PW0-105 Certified Wireless Network Administrator CWNA Exam Set 1

Which of the following is a computer network that is layered on top of an underlying computer network?


Options are :

  • WLAN
  • VPN
  • TSN
  • RSN

Answer : VPN

You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domainbased network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.Which of the following steps will you take to accomplish the task?


Options are :

  • Configure phishing filter in Windows Mail. Configure it to move such mails to the Junk Mail folder.
  • Remove domain names of such emails from the Safe Sender's list.
  • Add domain names of such emails in the Block Sender's list.
  • Configure phishing filter in Internet Explorer 7.0. Configure it to filter all phishing mails.

Answer : Configure phishing filter in Windows Mail. Configure it to move such mails to the Junk Mail folder.

Which of the following security methods can be used to detect the DoS attack in order to enhance the security of the network?


Options are :

  • Spectrum analyzer
  • Protocol analyzer
  • WLAN controller
  • WIPS

Answer : WIPS

CWNA-106 Certified Wireless Network Administrator Exam Set 1

Which of the following encryption methods uses AES technology?


Options are :

  • Dynamic WEP
  • Static WEP
  • CCMP
  • TKIP

Answer : CCMP

Peter works as a Network Administrator for the uCertify Inc. The company has a Windowsbased network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?


Options are :

  • Buffer overflow attack
  • SQL injection attack
  • Man-in-the-middle attack
  • Denial-of-Service (DoS) attack

Answer : Denial-of-Service (DoS) attack

Which of the following is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for computers to connect and use a network service?


Options are :

  • RADIUS
  • HTTP
  • IPSec
  • SSL

Answer : RADIUS

PW0-105 Certified Wireless Network Administrator CWNA Exam Set 1

You work as a Network Administrator for uCertify Inc. You need to provide a secure communication between the server and the client computers of the company. Which of the following protocols will you use to manage the communication securely?


Options are :

  • TCP
  • TLS
  • HTTP
  • SSL

Answer : TLS SSL

Which of the following are the security measures that are needed to maintain the security of wireless LAN? Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • WIDS
  • Firewalls
  • WIPS
  • WLAN controller

Answer : WIDS Firewalls WIPS

Which of the following components are typically required for securing a wireless 802.11 network?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Network segmentation
  • AAA
  • Data confidentiality
  • Monitoring

Answer : Network segmentation AAA Data confidentiality Monitoring

PW0-104 Wireless LAN Administration Certified Practice Exam Set 5

Which of the following provides the best protection against a man-in-the-middle attack?


Options are :

  • Fiber-optic cable
  • Strong password
  • Strong encryption
  • Firewall

Answer : Strong encryption

Which of the following encryption methods use the RC4 technology?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • Dynamic WEP
  • Static WEP
  • CCMP
  • TKIP

Answer : Dynamic WEP Static WEP TKIP

Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • SYN flood attack
  • RF jamming attack
  • Spoofing attack
  • Password cracking

Answer : SYN flood attack Spoofing attack

PW0-105 Certified Wireless Network Administrator Exam Set 3

Which of the following protocols are used to secure a VPN connection?Each correct answer represents a complete solution. Choose all that apply.


Options are :

  • SSL
  • IPSec
  • TLS
  • L2TP

Answer : IPSec L2TP

Which of the following attacks on wireless LAN is performed to shut down the wireless network?


Options are :

  • Jamming attack
  • Active attack
  • Man-in-the-middle attack
  • Passive attack

Answer : Jamming attack

Which of the following types of attacks is performed by Adam?


Options are :

  • DDoS attack that involves flooding a network or system
  • DoS attack that involves crashing a network or system
  • Man-in-the-middle attack
  • Reverse social engineering attack

Answer : DoS attack that involves crashing a network or system

PW0-270 Certified Wireless Analysis Professional (CWAP) Exam Set 1

Comment / Suggestion Section
Point our Mistakes and Post Your Suggestions