This page was exported from Free Braindump2go Latest Microsoft Exam Dumps [ http://www.cwnpdumps.com ] Export date:Mon May 20 13:12:31 2019 / +0000 GMT ___________________________________________________ Title: Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (51-60) --------------------------------------------------- QUESTION 51Which of the following protocols is designed to provide more secure encryption than the weak wired encryption privacy?A.    LEAPB.    TKIPC.    PEAPD.    CCMP Answer: B QUESTION 52Which of the following are the security measures that are needed to maintain the security of wireless LAN?Each correct answer represents a complete solution. Choose all that apply. A.    WIPSB.    WLAN controllerC.    FirewallsD.    WIDS Answer: ACD QUESTION 53Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets? A.    FraggleB.    SmurfC.    BonkD.    Ping flood Answer: C QUESTION 54You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domainbased network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.Which of the following steps will you take to accomplish the task? A.    Configure phishing filter in Internet Explorer 7.0. Configure it to filter all phishing mails.B.    Remove domain names of such emails from the Safe Sender's list.C.    Configure phishing filter in Windows Mail. Configure it to move such mails to the Junk Mail folder.D.    Add domain names of such emails in the Block Sender's list. Answer: C QUESTION 55Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)? A.    L2TPB.    IPSecC.    WAPD.    WEP Answer: D QUESTION 56Which of the following keys is derived from Group Master Key (GMK)? A.    Private KeyB.    Group Temporal KeyC.    Public KeyD.    Pairwise Transient Key Answer: B QUESTION 57Which of the following types of filtering allows or restricts the flow of specific types of packets to provide security? A.    Route filteringB.    MAC address filteringC.    Packet filteringD.    Ingress filtering Answer: C QUESTION 58Peter works as a Network Administrator for the uCertify Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker? A.    Buffer overflow attackB.    Denial-of-Service (DoS) attackC.    SQL injection attackD.    Man-in-the-middle attack Answer: B QUESTION 59Which of the following is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for computers to connect and use a network service? A.    HTTPB.    SSLC.    IPSecD.    RADIUS Answer: D QUESTION 60Which of the following are social engineering techniques?Each correct answer represents a complete solution. Choose all that apply. A.    PhishingB.    BaitingC.    PretextingD.    Salami attack Answer: ABC If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version. --------------------------------------------------- Images: http://examgod.com/geimages/Free-Download-Pass4sure-and-Lead2pass-CW_8DEE/image.png --------------------------------------------------- --------------------------------------------------- Post date: 2014-03-17 01:42:50 Post date GMT: 2014-03-17 01:42:50 Post modified date: 2014-03-17 02:04:34 Post modified date GMT: 2014-03-17 02:04:34 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com