This page was exported from Free Braindump2go Latest Microsoft Exam Dumps [ http://www.cwnpdumps.com ] Export date:Mon Jul 22 20:32:26 2019 / +0000 GMT ___________________________________________________ Title: Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (61-70) --------------------------------------------------- QUESTION 61You work as a Network Administrator for uCertify Inc. You need to provide a secure communication between the server and the client computers of the company. Which of the following protocols will you use to manage the communication securely?A.    HTTPB.    TCPC.    TLSD.    SSL Answer: CD QUESTION 62Which of the following types of attacks is performed by Adam? A.    Man-in-the-middle attackB.    Reverse social engineering attackC.    DDoS attack that involves flooding a network or systemD.    DoS attack that involves crashing a network or system Answer: D QUESTION 63Which of the following components are typically required for securing a wireless 802.11 network?Each correct answer represents a complete solution. Choose all that apply. A.    Network segmentationB.    MonitoringC.    AAAD.    Data confidentiality Answer: ABCD QUESTION 64Which of the following is an application protocol that is used to query and modify data using directory services running over TCP/IP? A.    LDAPB.    HTTPC.    LEAPD.    RBAC Answer: A QUESTION 65Which of the following encryption algorithms is used by Wired Equivalent Privacy (WEP)? A.    RSAB.    RC4C.    TKIPD.    CCMP Answer: B QUESTION 66Which of the following actions will you perform to accomplish the task?Each correct answer represents a complete solution. Choose all that apply. A.    Configure the wireless network to use WEP encryption for the data transmitted over a wireless network.B.    Implement the IEEE 802.1X authentication for the wireless network.C.    Using group policies, configure the network to allow the wireless computers to connect to the infrastructure networks only.D.    Using group policies, configure the network to allow the wireless computers to connect to the ad hoc networks only.E.    Implement the open system authentication for the wireless network. Answer: ABC QUESTION 67Which of the following are the types of password guessing attacks?Each correct answer represents a complete solution. Choose two. A.    Password attackB.    Man-in-the-middle attackC.    Dictionary attackD.    Brute force attack Answer: CD   QUESTION 68Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function? A.    EAP-TLSB.    CHAPC.    EAPD.    PEAP Answer: B QUESTION 69Which of the following policies are considered as a good starting point while designing a wireless security policy document? Each correct answer represents a complete solution. Choose all that apply. A.    Rogue AP policyB.    Functional security policyC.    Protocol policyD.    General security policy Answer: ABD QUESTION 70Which of the following are important characteristics of VPNs?Each correct answer represents a complete solution. Choose all that apply. A.    EncapsulationB.    AuthenticationC.    EncryptionD.    Data integrity Answer: ABCD If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version. --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2014-03-21 03:37:50 Post date GMT: 2014-03-21 03:37:50 Post modified date: 2014-03-21 03:37:50 Post modified date GMT: 2014-03-21 03:37:50 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com