Module 16 – Configure Network and Device Security Quiz Answers

1. What type of authentication do most access points use by default?

  • WEP
  • PSK
  • open
  • EAP

Explanation: The three types of wireless authentication methods are open authentication, PSK, and EAP. The most common default authentication method is open authentication.

2. What is the purpose of a DMZ?

  • It creates an encrypted and authenticated tunnel for remote hosts to access the internal network.
  • It allows external hosts to access specific company servers while maintaining the security restrictions for the internal network.
  • It analyzes traffic for intrusion attempts and sends reports to management stations.
  • It provides secure connectivity for clients that connect to the internal network through a wireless LAN.

Explanation: The DMZ is an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network. It allows external hosts to access internal servers.

3. Which two actions improve security on a wireless network? (Choose two.)

  • Enable WEP.
  • Keep the default administrator password for the access point.
  • Broadcast the default SSID.
  • Enable MAC filtering.

Explanation: MAC filtering allows an administrator to limit access to a wireless network and to control which devices, based on MAC address, can access the network. The Wired Equivalency Protocol (WEP) is a security feature that encrypts network traffic over the wireless network. WEP uses pre-configured keys to encrypt and decrypt data.

4. What is the term used to describe the area of a network which stores servers that are accessible to any users from the Internet?

  • DMZ
  • extranet
  • demarcation point
  • intranet

Explanation: The DMZ refers to an area of the network that is accessible to both internal and external users. It is more secure than the external network but not as secure as the internal network.

5. What is a feature that can be used by an administrator to prevent unauthorized users from connecting to a wireless access point?

  • proxy server
  • software firewall
  • WPA encryption
  • MAC filtering

Explanation: Limiting a certain set of MAC addresses to connect to an access point is a way to ensure that only those devices are allowed to use the wireless network. A software firewall is used to prevent other users from gaining access to the protected computer. Configuring WPA encryption does not guarantee that the unauthorized user will not find the way to connect to the network. A proxy server is mostly used to filter traffic based on content.

6. What is the purpose of a wireless SSID?

  • to reliably receive and transmit data from wireless clients
  • to uniquely identify a wireless network
  • to securely connect a wireless client to an access point
  • to securely transmit data between wireless clients

Explanation: A Service Set Identifier (SSID) is a 32-byte field used to uniquely identify a wireless network. The SSID is configured on the access point or wireless router and is transmitted in packets and broadcasts by default.

7. Port triggering has been configured on a wireless router. Port 25 has been defined as the trigger port and port 113 as an open port. What effect does this have on network traffic?

  • All traffic that is sent into port 25 to the internal network will also be allowed to use port 113.
  • Any traffic that is using port 25 going out of the internal network will also be allowed to transmit out port 113.
  • All traffic that is sent out port 25 will open port 113 to allow inbound traffic into the internal network through port 113.
  • Any traffic that comes into port 25 allows outgoing port 113 to be used.

Explanation: Port triggering is used to allow inbound traffic through the firewall based on outbound traffic. The trigger occurs when an application makes use of a specific port on the internal network. An external port on the firewall is then opened. This allows for temporary passage of traffic through inbound ports to a specific device.

8. A network administrator has decided to use WPA2 for security in a WLAN. Which statement describes WPA2?

  • WPA2 specifies the use of a dynamic encryption key.
  • WPA2 uses preconfigured keys to encrypt and decrypt data.
  • WPA2 specifies the use of a static encryption key that must be changed frequently to enhance security.
  • WPA2 requires use of an open authentication method.

Explanation: WPA2, unlike WEP which uses preconfigured keys, generates new, dynamic keys each time a client establishes a connection with the AP.

9. Which component is designed to protect against unauthorized communications to and from a computer?

  • port scanner
  • antivirus
  • antimalware
  • firewall
  • security center

Explanation: Antivirus and antimalware software are used to prevent infection from malicious software. A port scanner is used to test a PC network connection to determine which ports the PC is listening to. The security center is an area of Windows that keeps track of the security software and settings on the PC. A firewall is designed to block unsolicited connection attempts to a PC unless they are specifically permitted.

10. Which wireless access point association parameter is used by the wireless client to distinguish between multiple wireless networks in the same vicinity?

  • network mode
  • SSID
  • channel setting
  • password

Explanation: Wireless access points are used to bridge traffic between wireless devices and other devices on the network. A wireless device uses the SSID association parameters to distinguish between multiple wireless networks. The SSID uniquely identifies a wireless LAN and is broadcast by most wireless access points.

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x