This page was exported from Free Braindump2go Latest Microsoft Exam Dumps [ http://www.cwnpdumps.com ] Export date:Mon May 20 12:56:30 2019 / +0000 GMT ___________________________________________________ Title: Free Download Pass4sure and Lead2pass CWNP PW0-204 Exam Question with PDF & VCE (71-80) --------------------------------------------------- QUESTION 71Which of the following is a computer network that is layered on top of an underlying computer network?A.    WLANB.    RSNC.    VPND.    TSN Answer: C QUESTION 72Which of the following attacks on wireless LAN is performed to shut down the wireless network? A.    Active attackB.    Man-in-the-middle attackC.    Passive attackD.    Jamming attack Answer: D QUESTION 73Which of the following does PEAP use to authenticate the user inside an encrypted tunnel?Each correct answer represents a complete solution. Choose two. A.    RC4B.    AESC.    MS-CHAP v2D.    GTC Answer: CD QUESTION 74Which of the following are NOT steps in securing your wireless connection?Each correct answer represents a complete solution. Choose two. A.    Using either WEP or WPA encryptionB.    Strong password policies on workstations.C.    MAC filtering on the routerD.    Not broadcasting SSIDE.    Hardening the server OS Answer: BE QUESTION 75Which of the following types of attacks entices a user to disclose personal information such as social security number, bank account details, or credit card number? A.    Replay attackB.    SpoofingC.    PhishingD.    Password guessing attack Answer: C QUESTION 76You work as a Network Administrator for Tech Perfect Inc. The company has a wireless LAN infrastructure. The management wants to prevent unauthorized network access to local area networks and other information assets by the wireless devices. What will you do? A.    Implement a dynamic NAT.B.    Implement an ACL.C.    Implement a WIPS.D.    Implement a firewall. Answer: C QUESTION 77Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?Each correct answer represents a complete solution. Choose all that apply. A.    Pairwise Master Key (PMK)B.    Group Master Key (GMK)C.    Pairwise Transient Key (PTK)D.    Group Temporal Key (GTK) Answer: ABCD QUESTION 78You work as a network administrator for Web Perfect Inc. You configure both WPA and EAP authentications on a client computer in the company's wireless network. Where will the encryption key be located during the active user session? Each correct answer represents a part of the solution. Choose two. A.    On the APB.    On the controllerC.    Shared with all clients in the networkD.    On the client Answer: AD QUESTION 79Which of the following protocols are used to secure a VPN connection?Each correct answer represents a complete solution. Choose all that apply. A.    IPSecB.    TLSC.    SSLD.    L2TP Answer: AD QUESTION 80Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?Each correct answer represents a complete solution. Choose all that apply. A.    RF jamming attackB.    Password crackingC.    Spoofing attackD.    SYN flood attack Answer: CD If you want to pass the CWNP PW0-204 exam sucessfully, recommend to read latest CWNP PW0-204 Dumps full version. --------------------------------------------------- Images: --------------------------------------------------- --------------------------------------------------- Post date: 2014-03-21 03:38:30 Post date GMT: 2014-03-21 03:38:30 Post modified date: 2014-03-21 03:38:30 Post modified date GMT: 2014-03-21 03:38:30 ____________________________________________________________________________________________ Export of Post and Page as text file has been powered by [ Universal Post Manager ] plugin from www.gconverters.com