This page was exported from Free Braindump2go Latest Microsoft Exam Dumps [ http://www.cwnpdumps.com ] Export date:Wed May 22 8:54:29 2019 / +0000 GMT ___________________________________________________ Title: Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (41-50) --------------------------------------------------- QUESTION 41Which of the following are the layers of physical security?Each correct answer represents a complete solution. Choose all that apply.A.    Procedural access controlB.    Video monitorC.    Environmental designD.    Intrusion detection system Answer: ACD QUESTION 42Your Company is receiving false and abusive e-mails from the e-mail address of your partner company. When you complain, the partner company tells you that they have never sent any such e-mails. Which of the following types of cyber crimes involves this form of network attack? A.    Man-in-the-middle attackB.    SpoofingC.    Cyber squattingD.    Cyber Stalking Answer: B QUESTION 43Which of the following attacks are considered as authentication attacks?Each correct answer represents a complete solution. Choose all that apply. A.    Man-in-the-middle attackB.    Eavesdropper attackC.    Jamming attackD.    Denial-of-Service (DoS) attack Answer: AB QUESTION 44Which of the following is a passive device that cannot be detected by a wireless intrusion detection system (WIDS)? A.    MAC spoofingB.    Spectrum analyzerC.    Protocol analyzerD.    Rogue access point Answer: C QUESTION 45Which of the following attacks is used to obtain a user's authentication credentials? A.    Teardrop attackB.    Brute force attackC.    Bonk attackD.    Phishing attack Answer: B QUESTION 46Which of the following are the three main intended goals of WEP encryption?Each correct answer represents a complete solution. Choose all that apply. A.    Access controlB.    AuthenticationC.    Data integrityD.    Confidentiality Answer: ACD QUESTION 47Which of the following encryption methods use the RC4 technology?Each correct answer represents a complete solution. Choose all that apply. A.    Dynamic WEPB.    TKIPC.    Static WEPD.    CCMP Answer: ABC QUESTION 48Which of the following keys are used by the symmetric key algorithm?Each correct answer represents a complete solution. Choose all that apply. A.    Pairwise Transient KeyB.    Public KeyC.    Group Temporal KeyD.    Private Key Answer: D QUESTION 49A Web developer with your company wants to have wireless access for contractors that come in to work on various projects. The process of getting this approved takes time. So rather than wait, he has put his own wireless router attached to one of the network ports in his department. What security risk does this present? A.    An unauthorized WAP is one way for hackers to get into a network.B.    It is likely to increase network traffic and slow down network performance.C.    This circumvents network intrusion detection.D.    None, adding a wireless access point is a common task and not a security risk. Answer: A QUESTION 50Which of the following protocols periodically verifies the identity of the client by using a three-way handshake? A.    CHAPB.    PAPC.    PPPD.    EAP-TLS Answer: A If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version. --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2014-03-17 01:41:30 Post date GMT: 2014-03-17 01:41:30 Post modified date: 2014-03-17 01:41:30 Post modified date GMT: 2014-03-17 01:41:30 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com