Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (71-80)

QUESTION 71
Which of the following is a computer network that is layered on top of an underlying computer network?

A.    WLAN
B.    RSN
C.    VPN
D.    TSN

Answer: C

QUESTION 72
Which of the following attacks on wireless LAN is performed to shut down the wireless network?

A.    Active attack
B.    Man-in-the-middle attack
C.    Passive attack
D.    Jamming attack

Answer: D

QUESTION 73
Which of the following does PEAP use to authenticate the user inside an encrypted tunnel?
Each correct answer represents a complete solution. Choose two.

A.    RC4
B.    AES
C.    MS-CHAP v2
D.    GTC

Answer: CD

QUESTION 74
Which of the following are NOT steps in securing your wireless connection?
Each correct answer represents a complete solution. Choose two.

A.    Using either WEP or WPA encryption
B.    Strong password policies on workstations.
C.    MAC filtering on the router
D.    Not broadcasting SSID
E.    Hardening the server OS

Answer: BE

QUESTION 75
Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number?

A.    Replay attack
B.    Spoofing
C.    Phishing
D.    Password guessing attack

Answer: C

QUESTION 76
You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do?

A.    Implement a dynamic NAT.
B.    Implement an ACL.
C.    Implement a WIPS.
D.    Implement a firewall.

Answer: C

QUESTION 77
Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?
Each correct answer represents a complete solution. Choose all that apply.

A.    Pairwise Master Key (PMK)
B.    Group Master Key (GMK)
C.    Pairwise Transient Key (PTK)
D.    Group Temporal Key (GTK)

Answer: ABCD

QUESTION 78
You work as a network administrator for Web Perfect Inc. You configure both WPA and EAP authentications on a client computer in the company’s wireless network. Where will the encryption key be located during the active user session? Each correct answer represents a part of the solution. Choose two.

A.    On the AP
B.    On the controller
C.    Shared with all clients in the network
D.    On the client

Answer: AD

QUESTION 79
Which of the following protocols are used to secure a VPN connection?
Each correct answer represents a complete solution. Choose all that apply.

A.    IPSec
B.    TLS
C.    SSL
D.    L2TP

Answer: AD

QUESTION 80
Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?
Each correct answer represents a complete solution. Choose all that apply.

A.    RF jamming attack
B.    Password cracking
C.    Spoofing attack
D.    SYN flood attack

Answer: CD

If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version.