click below
click below
Normal Size Small Size show me how
Wireless Security
comptia+ topic
Question | Answers |
---|---|
Which of the following wireless encryption schemes offers the highest level of protection? | wpa3 |
Which of the wireless security protocols listed below has been deprecated in favor of newer standards due to known vulnerabilities resulting from implementation flaws? | wep |
Which of the cryptographic algorithms listed below is the least vulnerable to attacks? | aes |
Which of the following encryption schemes is used in WiFi Protected Access 2 (WPA2)? | aes-ccmp |
For the purpose of encryption, WiFi Protected Access 3 (WPA3) takes advantage of: (Select 2 answers) | aes-gcmp aes-ccmp |
Which of the following acronyms refers to a client authentication method used in WPA2 Personal mode? | psk |
Which of the following acronyms refers to a client authentication method used in WPA3 Personal mode? | sae |
Extensible Authentication Protocol - an authentication framework usually used in wireless networks & pt 2 pt connections. EAP gives an authentication framework, not a specific authentication mechanism... | true |
Which of the following EAP methods offers the highest level of security? | eap-tls |
Which of the EAP methods listed below relies on client-side and server-side certificates for authentication? | eap-tls |
Which of the following answers refers to an IEEE standard that can be implemented in a situation where an Ethernet switch acts as an authenticator for devices that intend to connect to a network through one of its ports? | IEEE 802.1X |
Which of the following would be the best solution for securing a small network that lacks an authentication server? | WPA3-SAE |
What are the characteristic features of WPA2/WPA3 Enterprise mode? (Select 3 answers) | Suitable for large corporate networks IEEE 802.1X Requires RADIUS authentication server |
A solution that simplifies configuration of new wireless networks by allowing non-technical users to easily configure network security settings and add new devices to an existing network is known as: | wps |
Which of the wireless technologies listed below are deprecated and should not be used due to their known vulnerabilities? (Select 2 answers) | wps wep |
Which of the following answers refers to a security solution that allows administrators to block network access for users until they perform required action? | captive portal |
The process of planning and designing new WLANs for optimal performance, security and compliance typically involves: | wireless site survey |
An administrator needs to adjust the placement of multiple Access Points (APs) to ensure the best wireless signal coverage for the network. Which of the following would be of help while identifying areas of low signal strength? | heat map |
Which of the following answers refers to a diagnostic tool that can be used for measuring wireless signal strength? | wifi analyzer |
In wireless networks, a situation where multiple channels share the frequency band causing interference and performance degradation for devices operating on channels that are too close to each other is known as: | channel overlapping |
A common example of channel overlapping in wireless networking would be the 2.4 GHz band used in 802.11 networks, where the 2.401-2.473 GHz freq. range is used for allocating 11 channels, each taking up a 22-MHz portion of the available spectrum... | true |
Which of the following would be of help in troubleshooting wireless signal loss and low wireless network signal coverage? (Select 2 answers) | WAP power level controls wifi analyzer |
Which wireless antenna type provides a 360-degree horizontal signal coverage? | Omnidirectional antenna |
Which of the following answers refers to a common antenna type used as a standard equipment on most Access Points (APs) for indoor Wireless Local Area Network (WLAN) deployments? | Omnidirectional antenna |