CCNA Module 3

CCNA Module 3

12th Grade

16 Qs

quiz-placeholder

Similar activities

ASAS SAINS KOMPUTER : TINGKATAN 3

ASAS SAINS KOMPUTER : TINGKATAN 3

4th Grade - University

12 Qs

Technology trends

Technology trends

7th - 12th Grade

15 Qs

Online Platform Block Q

Online Platform Block Q

11th - 12th Grade

20 Qs

City & Guilds Award in Business Processes

City & Guilds Award in Business Processes

12th Grade

20 Qs

emptech L1 A

emptech L1 A

12th Grade

15 Qs

ASPEK LEGAL TIK XII

ASPEK LEGAL TIK XII

12th Grade

20 Qs

Pengayaan Informatika

Pengayaan Informatika

12th Grade

20 Qs

KUIS 3_US SIMKD

KUIS 3_US SIMKD

12th Grade

20 Qs

CCNA Module 3

CCNA Module 3

Assessment

Quiz

Computers

12th Grade

Practice Problem

Hard

Created by

Alicia Pierce

Used 4+ times

FREE Resource

AI

Enhance your content in a minute

Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...

16 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which one of the following wireless security schemes requires or mandates GCMP in its 192-bit mode?


WPA

WPA2

WPA3

None, all WPA versions require it

Answer explanation

WPA requires TKIP, WPA2 requires AES and CCMP, WPA3 in 128-bit mode requires AES and CCMP, but WPA3 in 192-bit mode requires AES-GCMP.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The WPA wireless security suites are defined by which of the following entities?

IEEE

FCC

Wi-Fi Alliance

Cisco

Answer explanation

The Wi-Fi Alliance defines all versions of the Wi-Fi Protected Access (WPA) security suite. The IEEE is not a correct answer because it defines and maintains many networking standards, including 802.11 and 802.1x, which are used in wireless networking. The FCC is not a correct answer because it is the governing body in the United States that regulates RF frequencies, channels, and transmission power. Cisco is not a correct answer because it designs and manufactures wireless networking products that must adhere to the WPA standards, but not define them.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

To protect the privacy of sensitive data sent over a wireless network, which of the following mechanisms should be leveraged?

Authentication

Message integrity check (MIC)

Encryption

Data privacy protection (DPP)

Answer explanation

Encryption is the only way to protect message privacy so that it can be unencrypted and understood by only the intended recipient. Authentication protects network access but does not protect privacy. The MIC function protects data integrity so that it cannot be altered without detection, but it does not affect data privacy. DPP does not affect data privacy because it is a fictitious mechanism.

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Identify unique characteristics of WPA2-Enterprise mode from the following list. (Select 2)

APs use pre-shared keys to authenticate wireless devices.

EAP authentication is used.

AES is used for data encryption.

802.1x is used to control access to the wireless network.

Answer explanation

WPA2-Enterprise mode uses 802.1x to control access until an EAP method successfully authenticates wireless users and devices. AES is used in WPA2-Enterprise, along with CCMP, but that is not unique to the WPA2 version. WPA and WPA3 also use AES, though with differing encryption protocols of CCMP and GCMP, respectively.

5.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

EAP-TLS, PEAP, and EAP-FAST are methods that can be used with which of the following wireless configurations? Select 2

WPA2-Personal

WPA2-Enterprise

WPA3-Personal

WPA3-Enterprise

Answer explanation

The enterprise mode of any WPA version will utilize external authentication through the EAP framework. Therefore, WPA2-Enterprise and WPA3-Enterprise are correct answers. Personal mode does not use EAP.

WPA, WPA2, and WPA3 Page number:1190

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which of the following are considered to be weaknesses or shortcomings of WPA2-Personal mode?

(Select 2)

Malicious users can capture the 4-way handshake and use a dictionary attack to guess the pre-shared key.

Initial deployment of the authentication servers is a complex task.

Pre-shared keys must be configured on every wireless device and updated periodically.

Each wireless user must periodically install a new digital certificate for authentication.

Answer explanation

WPA2-Personal mode uses a pre-shared key to authenticate wireless devices. Therefore, the pre-shared keys must be configured on every wireless device. If the key ever needs to be changed, network administrators must touch every device to enter a new key. As well, the 4-way handshake can be captured, allowing malicious users to launch an offline dictionary attack to recover the actual pre-shared key. WPA2-Personal does not involve the use of authentication servers or digital certificates.

WPA, WPA2, and WPA3 Page number:1190

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What versions of Wi-Fi Protected Access (WPA) were defined after the IEEE ratified the IEEE 802.11i security standard?

(Select 2)

WPA

WPA2

WPA3

WPA0

Answer explanation

The Wi-Fi alliance defines three versions of Wi-Fi Protected Access (WPA):

- WPA: First generation of WPA certification; based on TKIP
- WPA2: Second generation based on CCMP
- WPA3: Third generation based on GCMP

Each version is meant to replace the previous version because of better security mechanisms. The Wi-Fi Alliance defined WPA before the IEEE created their 802.11i security standard. After the IEEE ratified 802.11i, the Wi-Fi Alliance defined WPA2, to replace WPA, matching the details in the 802.11i standard.  

WPA, WPA2, and WPA3 Page number:1190

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?