CCNA Module 3

CCNA Module 3

12th Grade

16 Qs

quiz-placeholder

Similar activities

AQA computer science- Unit 6 communication revision

AQA computer science- Unit 6 communication revision

12th Grade - University

20 Qs

Latian soal Day4

Latian soal Day4

9th - 12th Grade

20 Qs

Wireless Network Crossword

Wireless Network Crossword

9th - 12th Grade

17 Qs

Infrastructure & Networking Warm-up

Infrastructure & Networking Warm-up

12th Grade

20 Qs

Network Technology

Network Technology

9th - 12th Grade

12 Qs

Testout Wireless Networking Chapter 9

Testout Wireless Networking Chapter 9

9th - 12th Grade

12 Qs

Module 22 - Wireless Networks 3

Module 22 - Wireless Networks 3

9th - 12th Grade

19 Qs

B.2.2 Practice Test

B.2.2 Practice Test

9th - 12th Grade

20 Qs

CCNA Module 3

CCNA Module 3

Assessment

Quiz

Computers

12th Grade

Hard

Created by

Alicia Pierce

Used 3+ times

FREE Resource

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following wireless security schemes requires or mandates GCMP in its 192-bit mode?


WPA

WPA2

WPA3

None, all WPA versions require it

Answer explanation

WPA requires TKIP, WPA2 requires AES and CCMP, WPA3 in 128-bit mode requires AES and CCMP, but WPA3 in 192-bit mode requires AES-GCMP.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The WPA wireless security suites are defined by which of the following entities?

IEEE

FCC

Wi-Fi Alliance

Cisco

Answer explanation

The Wi-Fi Alliance defines all versions of the Wi-Fi Protected Access (WPA) security suite. The IEEE is not a correct answer because it defines and maintains many networking standards, including 802.11 and 802.1x, which are used in wireless networking. The FCC is not a correct answer because it is the governing body in the United States that regulates RF frequencies, channels, and transmission power. Cisco is not a correct answer because it designs and manufactures wireless networking products that must adhere to the WPA standards, but not define them.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To protect the privacy of sensitive data sent over a wireless network, which of the following mechanisms should be leveraged?

Authentication

Message integrity check (MIC)

Encryption

Data privacy protection (DPP)

Answer explanation

Encryption is the only way to protect message privacy so that it can be unencrypted and understood by only the intended recipient. Authentication protects network access but does not protect privacy. The MIC function protects data integrity so that it cannot be altered without detection, but it does not affect data privacy. DPP does not affect data privacy because it is a fictitious mechanism.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify unique characteristics of WPA2-Enterprise mode from the following list. (Select 2)

APs use pre-shared keys to authenticate wireless devices.

EAP authentication is used.

AES is used for data encryption.

802.1x is used to control access to the wireless network.

Answer explanation

WPA2-Enterprise mode uses 802.1x to control access until an EAP method successfully authenticates wireless users and devices. AES is used in WPA2-Enterprise, along with CCMP, but that is not unique to the WPA2 version. WPA and WPA3 also use AES, though with differing encryption protocols of CCMP and GCMP, respectively.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

EAP-TLS, PEAP, and EAP-FAST are methods that can be used with which of the following wireless configurations? Select 2

WPA2-Personal

WPA2-Enterprise

WPA3-Personal

WPA3-Enterprise

Answer explanation

The enterprise mode of any WPA version will utilize external authentication through the EAP framework. Therefore, WPA2-Enterprise and WPA3-Enterprise are correct answers. Personal mode does not use EAP.

WPA, WPA2, and WPA3 Page number:1190

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are considered to be weaknesses or shortcomings of WPA2-Personal mode?

(Select 2)

Malicious users can capture the 4-way handshake and use a dictionary attack to guess the pre-shared key.

Initial deployment of the authentication servers is a complex task.

Pre-shared keys must be configured on every wireless device and updated periodically.

Each wireless user must periodically install a new digital certificate for authentication.

Answer explanation

WPA2-Personal mode uses a pre-shared key to authenticate wireless devices. Therefore, the pre-shared keys must be configured on every wireless device. If the key ever needs to be changed, network administrators must touch every device to enter a new key. As well, the 4-way handshake can be captured, allowing malicious users to launch an offline dictionary attack to recover the actual pre-shared key. WPA2-Personal does not involve the use of authentication servers or digital certificates.

WPA, WPA2, and WPA3 Page number:1190

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What versions of Wi-Fi Protected Access (WPA) were defined after the IEEE ratified the IEEE 802.11i security standard?

(Select 2)

WPA

WPA2

WPA3

WPA0

Answer explanation

The Wi-Fi alliance defines three versions of Wi-Fi Protected Access (WPA):

- WPA: First generation of WPA certification; based on TKIP
- WPA2: Second generation based on CCMP
- WPA3: Third generation based on GCMP

Each version is meant to replace the previous version because of better security mechanisms. The Wi-Fi Alliance defined WPA before the IEEE created their 802.11i security standard. After the IEEE ratified 802.11i, the Wi-Fi Alliance defined WPA2, to replace WPA, matching the details in the 802.11i standard.  

WPA, WPA2, and WPA3 Page number:1190

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?