Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (51-60)

QUESTION 51
Which of the following protocols is designed to provide more secure encryption than the weak wired encryption privacy?

A.    LEAP
B.    TKIP
C.    PEAP
D.    CCMP

Answer: B

QUESTION 52
Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Each correct answer represents a complete solution. Choose all that apply.

A.    WIPS
B.    WLAN controller
C.    Firewalls
D.    WIDS

Answer: ACD

QUESTION 53
Which of the following DoS attacks affects mostly Windows computers by sending corrupt UDP packets?

A.    Fraggle
B.    Smurf
C.    Bonk
D.    Ping flood

Answer: C

QUESTION 54
You work as a Network Administrator for Blue Well Inc. The company has a Windows Server 2008 domainbased network. All client computers on the network run Windows Vista Ultimate. Andy, a Finance Manager, uses Windows Mail to download his e-mails to his inbox. He complains that every now and then he gets mails asking for revealing personal or financial information. He wants that such mails are not shown to him.
Which of the following steps will you take to accomplish the task?

image

A.    Configure phishing filter in Internet Explorer 7.0. Configure it to filter all phishing mails.
B.    Remove domain names of such emails from the Safe Sender’s list.
C.    Configure phishing filter in Windows Mail. Configure it to move such mails to the Junk Mail folder.
D.    Add domain names of such emails in the Block Sender’s list.

Answer: C

QUESTION 55
Which of the following provides security by implementing authentication and encryption on Wireless LAN (WLAN)?

A.    L2TP
B.    IPSec
C.    WAP
D.    WEP

Answer: D

QUESTION 56
Which of the following keys is derived from Group Master Key (GMK)?

A.    Private Key
B.    Group Temporal Key
C.    Public Key
D.    Pairwise Transient Key

Answer: B

QUESTION 57
Which of the following types of filtering allows or restricts the flow of specific types of packets to provide security?

A.    Route filtering
B.    MAC address filtering
C.    Packet filtering
D.    Ingress filtering

Answer: C

QUESTION 58
Peter works as a Network Administrator for the uCertify Inc. The company has a Windows-based network. All client computers run the Windows XP operating system. The employees of the company complain that suddenly all of the client computers have started working slowly. Peter finds that a malicious hacker is attempting to slow down the computers by flooding the network with a large number of requests. Which of the following attacks is being implemented by the malicious hacker?

A.    Buffer overflow attack
B.    Denial-of-Service (DoS) attack
C.    SQL injection attack
D.    Man-in-the-middle attack

Answer: B

QUESTION 59
Which of the following is a networking protocol that provides centralized authentication, authorization, and accounting (AAA) management for computers to connect and use a network service?

A.    HTTP
B.    SSL
C.    IPSec
D.    RADIUS

Answer: D

QUESTION 60
Which of the following are social engineering techniques?
Each correct answer represents a complete solution. Choose all that apply.

A.    Phishing
B.    Baiting
C.    Pretexting
D.    Salami attack

Answer: ABC

If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version.