Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (71-80)
QUESTION 71
Which of the following is a computer network that is layered on top of an underlying computer network?
A. WLAN
B. RSN
C. VPN
D. TSN
Answer: C
QUESTION 72
Which of the following attacks on wireless LAN is performed to shut down the wireless network?
A. Active attack
B. Man-in-the-middle attack
C. Passive attack
D. Jamming attack
Answer: D
QUESTION 73
Which of the following does PEAP use to authenticate the user inside an encrypted tunnel?
Each correct answer represents a complete solution. Choose two.
A. RC4
B. AES
C. MS-CHAP v2
D. GTC
Answer: CD
QUESTION 74
Which of the following are NOT steps in securing your wireless connection?
Each correct answer represents a complete solution. Choose two.
A. Using either WEP or WPA encryption
B. Strong password policies on workstations.
C. MAC filtering on the router
D. Not broadcasting SSID
E. Hardening the server OS
Answer: BE
QUESTION 75
Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?
A. Replay attack
B. Spoofing
C. Phishing
D. Password guessing attack
Answer: C
QUESTION 76
You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?
A. Implement a dynamic NAT.
B. Implement an ACL.
C. Implement a WIPS.
D. Implement a firewall.
Answer: C
QUESTION 77
Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?
Each correct answer represents a complete solution. Choose all that apply.
A. Pairwise Master Key (PMK)
B. Group Master Key (GMK)
C. Pairwise Transient Key (PTK)
D. Group Temporal Key (GTK)
Answer: ABCD
QUESTION 78
You work as a network administrator for Web Perfect Inc. You configure both WPA and EAP authentications on a client computer in the company’s wireless network. Where will the encryption key be located during the active user session? Each correct answer represents a part of the solution. Choose two.
A. On the AP
B. On the controller
C. Shared with all clients in the network
D. On the client
Answer: AD
QUESTION 79
Which of the following protocols are used to secure a VPN connection?
Each correct answer represents a complete solution. Choose all that apply.
A. IPSec
B. TLS
C. SSL
D. L2TP
Answer: AD
QUESTION 80
Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?
Each correct answer represents a complete solution. Choose all that apply.
A. RF jamming attack
B. Password cracking
C. Spoofing attack
D. SYN flood attack
Answer: CD
If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version.