This page was exported from Free Braindump2go Latest Microsoft Exam Dumps [ http://www.cwnpdumps.com ]
Export date: Mon Jul 22 20:32:30 2019 / +0000 GMT

Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (41-50)



QUESTION 41
Which of the following are the layers of physical security?
Each correct answer represents a complete solution. Choose all that apply.

A.    Procedural access control
B.    Video monitor
C.    Environmental design
D.    Intrusion detection system

Answer: ACD


QUESTION 42
Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack?

A.    Man-in-the-middle attack
B.    Spoofing
C.    Cyber squatting
D.    Cyber Stalking

Answer: B


QUESTION 43
Which of the following attacks are considered as authentication attacks?
Each correct answer represents a complete solution. Choose all that apply.

A.    Man-in-the-middle attack
B.    Eavesdropper attack
C.    Jamming attack
D.    Denial-of-Service (DoS) attack

Answer: AB


QUESTION 44
Which of the following is a passive device that cannot be detected by a wireless intrusion detection system (WIDS)?

A.    MAC spoofing
B.    Spectrum analyzer
C.    Protocol analyzer
D.    Rogue access point

Answer: C


QUESTION 45
Which of the following attacks is used to obtain a user's authentication credentials?

A.    Teardrop attack
B.    Brute force attack
C.    Bonk attack
D.    Phishing attack

Answer: B


QUESTION 46
Which of the following are the three main intended goals of WEP encryption?
Each correct answer represents a complete solution. Choose all that apply.

A.    Access control
B.    Authentication
C.    Data integrity
D.    Confidentiality

Answer: ACD


QUESTION 47
Which of the following encryption methods use the RC4 technology?
Each correct answer represents a complete solution. Choose all that apply.

A.    Dynamic WEP
B.    TKIP
C.    Static WEP
D.    CCMP

Answer: ABC


QUESTION 48
Which of the following keys are used by the symmetric key algorithm?
Each correct answer represents a complete solution. Choose all that apply.

A.    Pairwise Transient Key
B.    Public Key
C.    Group Temporal Key
D.    Private Key

Answer: D


QUESTION 49
A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present?

A.    An unauthorized WAP is one way for hackers to get into a network.
B.    It is likely to increase network traffic and slow down network performance.
C.    This circumvents network intrusion detection.
D.    None, adding a wireless access point is a common task and not a security risk.

Answer: A


QUESTION 50
Which of the following protocols periodically verifies the identity of the client by using a three-way handshake?

A.    CHAP
B.    PAP
C.    PPP
D.    EAP-TLS

Answer: A

If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version.

 

 


Post date: 2014-03-17 01:41:30
Post date GMT: 2014-03-17 01:41:30
Post modified date: 2014-03-17 01:41:30
Post modified date GMT: 2014-03-17 01:41:30

Powered by [ Universal Post Manager ] plugin. MS Word saving format developed by gVectors Team www.gVectors.com