201-250 Flashcards
(43 cards)
802.1X/EAP-TLS supports what client authentication credential type?
A. Passwords
B. x.509 Certificates
C. Digital Security Token
D. MD5 Hash Exchange
E. Biometric
B
Which wireless security protocol cannot use digital certificates for both the supplicant and authentication server?
A. EAP-TLS
B. IPSec VPN
C. PEAPv0/EAP-TLS
D. EAP-TTLS
E. LEAP
E
Why do PEAPv0/EAP-TLS and PPTP/EAP-TLS offer stronger authentication than PEAPv0/EAP- MSCHAPv2 and PPTP/MS-CHAPv2?
A. MS-CHAPv2 supports only protected access credentials (PACs), but EAP-TLS supports smart cards andsecure tokens for client authentication.
B. EAP-TLS uses x.509 certificates for client and server authentication while MS-CHAPv2 uses passwordauthentication.
C. Use of MS-CHAPv2 allows only RADIUS to be used as an authentication server, but EAP-TLS allows bothRADIUS and TACACS+.
D. EAP-TLS supports hashing passwords before they are transmitted across the medium by clients, but MSCHAPv2supports only clear text passwords.
B
Which 802.1X/EAP type allows a maximum of three phases of authentication?
A. EAP-FAST
B. EAP-TTLS/MS-CHAPv2
C. PEAPv0/EAP-MSCHAPv2
D. PEAPv1/EAP-GTC
E. EAP-TLS
A
What is the primary difference between EAP-TLS and EAP-TTLS authentication?
A. EAP-TTLS provides strong client authentication and EAP-TLS does not
B. EAP-TLS is an authentication protocol, and EAP-TTLS is an encryption type
C. EAP-TTLS provides support for legacy client authentication methods, and EAP-TLS requires certificates forclient-side authentication
D. EAP-TLS uses a RADIUS server for authentication, and EAP-TTLS can only use Kerberos E. EAP-TLS uses IP-based authentication, and EAP-TTLS uses MAC-based authentication
C
Which statements are true regarding deployment of lightweight access points? (Choose four)
A. Lightweight access points support 802.3af and may connect directly to the WLAN controller or to anEthernet switch.
B. Lightweight access points may connect to the WLAN controller with either a Layer-2 or a Layer- 3 protocol.
C. Lightweight access points may be controlled over either Layer-2 or Layer-3.
D. Lightweight access points may use DNS to locate their assigned WLAN controller.
E. Lightweight access points cannot be deployed over the Internet due to Network Address Translation.
F. Lightweight access points may be configured for 802.11a or 802.11g, but not both simultaneously.
A, B, C, D
What is a consideration when implementing a security policy regarding wireless bridging?
A. Bridge links can be mistaken for public accesshot-spots
B. Bridge links should be used as corporate access points whenever possible
C. Bridge links can span miles so an intruder is unlikely to be seen or located
D. Bridge links cannot be protected by 802.1X/EAP authentication so an appropriate VPN solution must bechosen
E. Wireless intrusion prevention systems (WIPS) should always have the ‘false root detection’ feature enabled
C
As part of its corporate security policy, your organization requires all wireless LANs to be separated from the wired network core using a device capable of authentication, data encryption, and throughput limiting. Which device will accomplish this policy requirement?
A. Wireless workgroup bridge
B. Transparent tunneling bridge
C. Wireless LAN controller
D. Personal firewall software
C
Which statement describes a potential architectural performance disadvantage of some WLAN controllers with centralized forwarding and controller-based access points in a large-scale WLAN deployment?
A. Data encryption/decryption is always performed on the WLAN controller.
B. The 802.11 distribution system (DS) is located in the WLAN controller software.
C. All WLAN traffic must flow through the WLAN controller.
D. Management frames and Control frames are always encapsulated in 802.3 frames.
C
In order to implement a robust security network (RSN) as defined by the 802.11i-2004 amendment, an administrator may not implement _______________?
A. The Wired Equivalent Privacy (WEP) Cipher Suite
B. The STAKey Handshake
C. The Pass-phrase-to-Preshared Key Algorithm
D. The Group Key Handshake
E. The TKIP Message Integrity Check (MIC) called ‘Michael’
A
Given: The enhanced confidentiality, data authentication, and replay protection mechanisms of the 802.11i-2004 amendment require fresh cryptographic keys. What wireless components are defined by the 802.11i- 2004 amendment to provide fresh cryptographic keys? (Choose three)
A. 4-Way Handshake
B. EAPoL Handshake
C. Group Handshake
D. 802.1X/EAP Handshake
E. AES-CCMP Handshake
F. STAKey Handshake
A, C, F
The 802.11i 4-way handshake process is used with which secure WLAN implementations? (Choose two)
A. When WPA-Personal is used on a SOHO WLAN router
B. When static WEP-128 is used on a WLAN switch
C. When IPSec is used on an Enterprise Wireless Gateway
D. When WPA2-Enterprise is used on an enterprise class thick AP
E. When HTTPS is used for a WLANhot-spotlogin
A, D
In an 802.11i-compliant 802.1X/EAP system, where are AAA keys generated?
A. On the 802.1X Authentication Server only
B. Manually by the network administrator
C. Jointly negotiated between the 802.1X Supplicant andthe 802.1X AuthenticationServer
D. On the 802.1X Authenticator only
E. In the Pass-phrase-to-PSK mapping algorithm
F. On the 802.1X Supplicant only
C
ABC Company has a Microsoft Windows 2003 Active Directory (AD) environment with IAS (an EAP-enabled RADIUS server) installed at their corporate headquarters (HQ) and at all branch locations. The HQ IAS server is currently used to authenticate HQ 802.11g WLAN users. ABC is installing an 802.11g WLAN at a branch office, and they have hired you to advise them on the best way to implement authentication for branch WLAN users. How will you configure access points at the branch office for maximized authentication speed and reliability?
A. Authenticate against the HQ IAS server. The HQ IAS will look up the user on the HQ AD servers.
B. Authenticate against the branch IAS server. The branch IAS server will look up the user on the branch ADserver.
C. Authenticate against the branch IAS server. The branch IAS server will proxy the request to the HQ IASserver. The HQ IAS server will look up the user on the HQ AD servers.
D. Authenticate against the branch IAS server. The branch IAS server will look up the user on the HQ ADservers.
B
What is one method of implementing RADIUS-based VLAN assignment?
A. VSA access lists
B. SSID assignment
C. Roaming profiles
D. VLAN map matrix
B
ABC Corporation, a software development organization, wishes to test their own LDAP implementation in a live wireless environment. Choose the appropriate ways to use LDAP for user authentication in a WLAN environment. (Choose three)
A. A WLAN switch using EAP-TTLS authentication sends a user authentication request to a RADIUS server.
The RADIUS server queries the LDAP server for user credential information.
B. An enterprise wireless gateway (EWG) directly queries the LDAP server for user credential information
C. An access point using PEAPv1/EAP-GTC sends an authentication request to the LDAP server whichproxies the request to a TACACS+ server for user credential authentication
D. A enterprise encryption gateway (EEG) sends an authentication request to an access control server whichproxies the request to a TACACS+ server, which in turn forwards auser credential request to the LDAPserver for verification
A, B, D
The 802.11i-2004 amendment defines and supports what three cipher suites? (Choose three)
A. WEP
B. PSK
C. CCMP
D. TKIP
E. IPSec
F. SSH2
A, C, D
ABC Corporation implemented a PPTP/MSCHAPv2/MPPE-128 VPN to secure its 802.11g WLAN one year ago. ABC Corp’s VPN concentrator has been using local authentication, and they have steadily grown to match the VPN server’s maximum local authentication capacity. As a consultant, you advise the network manager to consider what steps in order to scale this WLAN security solution and to strengthen its security? (Choose two)
A. ABC Corp’s users should implement personal firewall software to prevent peer-to-peer attacks.
B. Implement WPA2-Personal at layer2 while leaving the PPTP VPN in place to increase scalability.
C. PPTP/RC4 should be changed to PPTP/AES to strengthen the VPN’s encryption.
D. Once the VPN server’s local database capacity is exceeded, ABC Corp should migrate to IPSec VPNtechnology for greater scalability.
E. ABC Corp should use RADIUS for authentication instead of local authentication on the VPN server.
A, E
You are a wireless network administrator for ABC Corporation. Currently ABC Corp has a VPN concentrator that uses a PPTP/MS-CHAPv2/MPPE-128 VPN security solution for its 100 WLAN users. Since the WLAN was installed, there have been multiple successful attacks against ABC Corp’s access points since they are using Open System authentication. ABC Corp wants to update their WLAN security solution. Which security solution would improve the security of ABC Corp’s access points while increasing encryption strength and network scalability?
A. L2TP/IPSec with AES-192
B. WPA2-Enterprise with EAP-TTLS
C. SSH2 with 3DES
D. WEP with Shared Key authentication
B
What statements describe the AES-CCMP data protection mechanism implemented by the 802.11i-2004 amendment?
A. Uses the 256-bit Rijndael encryption algorithm to protect the MPDU Data field.
B. Protects the integrity of both the MPDU Data field and selected portions of the MPDU header.
C. Has support for CCMP using a 128-bit key that is mandatory for Robust Security Network (RSN) compliancewhen not using TKIP.
D. Uses either the RC4 stream cipher or 3DES block cipher to encrypt the MPDU Data field.
E. Uses a 192-bit encryption algorithm to protect authentication between the supplicant and authenticationserver.
B
You have been hired by ABC Corporation to perform a WLAN security audit. ABC’s network manager has attended a one-day manufacturer’s seminar on WLAN security and, in your opinion, knows only enough to ask good questions of a WLAN security professional. The network manager asks you about the specific advantages of TKIP over WEP. You explain that TKIP has the following advantages over WEP: (Choose two)
A. Inclusion of SHA-HMAC authentication to prevent man-in-the-middle attacks
B. Inclusion of a strong MIC to prevent in-transit frame tampering and replay attacks
C. Replacement of IVs with LIVs to prevent attacks against weak passwords
D. Replacement of CRC-32 with ICV-32 to prevent brute-force attacks against RC4
E. Improved per-packet keying to prevent weak IVs from being used to derive the WEP key
B, E
Two IT administrators at ABC Corporation are debating the differences between WPA2 and Layer 3 VPN technologies. The IT Director settles the dispute by explaining how WPA2 secures the WLAN data frame payloads. Which description of this process is correct in describing how WPA2 secures wireless data transmissions?
A. WPA2 encrypts layer 2 addresses and encrypts the layer 3 through layer 7 payloads.
B. WPA2 encodes layer 2 addresses with a 64-bit offset and encrypts the layer 3 and layer 4 addresses only.
C. WPA2 encrypts layer 3 through layer 7 payloads while leaving layer 2 source and destination addressesexposed.
D. WPA2 leaves the layer 2 and layer 3 addresses exposed while encrypting layer 4 through layer 7 payloads.
C
What statements are true regarding access point firmware updates? (Choose two)
A. A WNMS distributes firmware to autonomous access points.
B. A WIPS distributes firmware to multiple vendors’ autonomous access points.
C. A WLAN controller distributes firmware to lightweight access points.
D. Client devices notify the WNMS when an access point’s firmware is out-of-date.
E. Autonomous access points automatically update firmware on their neighboring access points.
A, C
What scenario could cause a ‘false positive’ intrusion alarm in a wireless intrusion prevention system (WIPS)?
A. A client device has a high rate of frame retransmissions due to a noisy RF environment.
B. A client device disassociates and reassociates to an AP several times in quick succession due to a lowRSSI value.
C. A reporting delay from a remote RF sensor due to busy WAN links.
D. A rogue access point is located and found to have the same SSID as the authorized network.
B