Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (61-70)

QUESTION 61
You work as a Network Administrator for uCertify Inc. You need to provide a secure communication between the server and the client computers of the company. Which of the following protocols will you use to manage the communication securely?

A.    HTTP
B.    TCP
C.    TLS
D.    SSL

Answer: CD

QUESTION 62
Which of the following types of attacks is performed by Adam?

A.    Man-in-the-middle attack
B.    Reverse social engineering attack
C.    DDoS attack that involves flooding a network or system
D.    DoS attack that involves crashing a network or system

Answer: D

QUESTION 63
Which of the following components are typically required for securing a wireless 802.11 network?
Each correct answer represents a complete solution. Choose all that apply.

A.    Network segmentation
B.    Monitoring
C.    AAA
D.    Data confidentiality

Answer: ABCD

QUESTION 64
Which of the following is an application protocol that is used to query and modify data using directory services running over TCP/IP?

A.    LDAP
B.    HTTP
C.    LEAP
D.    RBAC

Answer: A

QUESTION 65
Which of the following encryption algorithms is used by Wired Equivalent Privacy (WEP)?

A.    RSA
B.    RC4
C.    TKIP
D.    CCMP

Answer: B

QUESTION 66
Which of the following actions will you perform to accomplish the task?
Each correct answer represents a complete solution. Choose all that apply.

A.    Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.
B.    Implement the IEEE 802.1X authentication for the wireless network.
C.    Using group policies, configure the network to allow the wireless computers to connect to the infrastructure
networks only.
D.    Using group policies, configure the network to allow the wireless computers to connect to the ad hoc
networks only.
E.    Implement the open system authentication for the wireless network.

Answer: ABC

QUESTION 67
Which of the following are the types of password guessing attacks?
Each correct answer represents a complete solution. Choose two.

A.    Password attack
B.    Man-in-the-middle attack
C.    Dictionary attack
D.    Brute force attack

Answer: CD

 

QUESTION 68
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?

A.    EAP-TLS
B.    CHAP
C.    EAP
D.    PEAP

Answer: B

QUESTION 69
Which of the following policies are considered as a good starting point while designing a wireless security policy document? Each correct answer represents a complete solution. Choose all that apply.

A.    Rogue AP policy
B.    Functional security policy
C.    Protocol policy
D.    General security policy

Answer: ABD

QUESTION 70
Which of the following are important characteristics of VPNs?
Each correct answer represents a complete solution. Choose all that apply.

A.    Encapsulation
B.    Authentication
C.    Encryption
D.    Data integrity

Answer: ABCD

If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version.