1. What are the best ways to secure WLANs? (Choose two.)
- SSID cloaking
- MAC address filtering
Explanation: Neither SSID cloaking nor MAC address filtering would deter a crafty intruder. The best way to secure a wireless network is to use authentication and encryption systems.
2. Which of the following authentication methods does not use a password shared between the wireless client and the AP?
Explanation: WEP, WPA, WPA2, and WPA3 all use a pre-shared password between the wireless client and the AP.
3. Which encryption method is used by the original 802.11 specification?
Explanation: The original 802.11 specification was designed to secure the data using the Rivest Cipher 4 (RC4) encryption method with a static key.
4. Which of the following encryption methods uses CCMP to recognize if the encrypted and non-encrypted bits have been altered?
Explanation: AES uses the Counter Cipher Mode with Block Chaining Message Authentication Code Protocol (CCMP) that allows destination hosts to recognize if the encrypted and non-encrypted bits have been altered.
5. Which of the following authentication methods has the user enter a pre-shared password? (Choose two)
- WPA Personal
- WPA Enterprise
- WPA2 Personal
- WPA2 Enterprise
Explanation: WPA Personal and WPA2 Personal both use a pre-shared password that wireless clients use to authenticate with the AP.