Wireless Networks, Ch 3, Pt 1

Wireless Networks, Ch 3, Pt 1

University

15 Qs

quiz-placeholder

Similar activities

Q5. Ethical Issues in information technology

Q5. Ethical Issues in information technology

University

20 Qs

Operating System

Operating System

University

15 Qs

Advanced Java UNIT-2(J2EE)-Quiz-4

Advanced Java UNIT-2(J2EE)-Quiz-4

University

20 Qs

Q6. Cybersecurity Best Practices

Q6. Cybersecurity Best Practices

University

15 Qs

AEGIS Cyber Quiz

AEGIS Cyber Quiz

University

15 Qs

NISS-DC-Quiz

NISS-DC-Quiz

University

15 Qs

Use Cases and  Domain Classes

Use Cases and Domain Classes

University

15 Qs

Domain 4 - Network Security

Domain 4 - Network Security

10th Grade - University

16 Qs

Wireless Networks, Ch 3, Pt 1

Wireless Networks, Ch 3, Pt 1

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Indira Dutta

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In the 802.1X authentication triangle, which component acts as the security guard that forwards authentication requests but does not make the final decision?

Supplicant

Authenticator

Authentication Server

NAC Policy Engine

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

During the initialization stage of 802.1X, why is the port kept in an unauthorized state?

To block all traffic until encryption keys are exchanged

To only allow authentication traffic until the user is validated

To prevent IP address assignment from DHCP

To test the client’s posture before allowing access

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which protocol framework does 802.1X rely on to carry credentials from the supplicant to the authentication server?

IPsec

TLS

EAP

GRE

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user enters valid credentials on a supplicant device, but the authenticator is not defined as a RADIUS client. What happens?

Access granted with limited privileges

Access granted with guest VLAN assignment

Authentication request ignored and connection fails

Authentication forwarded but not logged

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a RADIUS shared secret?

To encrypt all user data after authentication

To prevent man-in-the-middle attacks during TLS handshake

To encrypt sensitive fields in RADIUS messages (e.g., password)

To validate Active Directory group membership

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In Microsoft NPS, which policy element defines the criteria an incoming request must match before the policy applies?

Constraints

Conditions

Settings

Attributes

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which attribute would a RADIUS server use to assign a fixed IP address to a user?

Idle-Timeout

Session-Timeout

Framed-IP-Address

Vendor-Specific Attribute

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?