Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us

 Home

 Search

Latest Brain Dumps

 BrainDump List

 Certifications Dumps

 Microsoft

 CompTIA

 Oracle

  Cisco
  CIW
  Novell
  Linux
  Sun
  Certs Notes
  How-Tos & Practices 
  Free Online Demos
  Free Online Quizzes
  Free Study Guides
  Free Online Sims
  Material Submission
  Test Vouchers
  Users Submissions
  Site Links
  Submit Site

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Online Training Demos and Learning Tutorials for Windows XP, 2000, 2003.

 

 

 

 





Braindumps for "PW0-200" Exam

Wireless LAN Security

 Question 1.
Which VPN protocol is described by: supports multiple encapsulated protocols, authentication and encryption, and uses a client / server architecture?

A. PPTP
B. L2TP
C. SSH2
D. IPSec

Answer: A

Explanation:
PPTP is based on the point-to-point protocol. PPTP enables users to access wireless networks securely and easily, and is natively supported by most Microsoft desktop and server operating systems.

Question 2.
Which type of segmentation device is described by: intelligent, but slow, uses security that is equivalent to a strong set of access control lists?

A. Firewall
B. Router
C. Layer 3 switch
D. VPN Concentrator

Answer: B

Question 3.
Which type of segmentation device is described by: used to filter between networks, can be designed as all-purpose or for specific filtering functions?

A. Router
B. Firewall
C. VPN Concentrator
D. Enterprise Encryption Gateway

Answer: B

Question 4.
Which EAP authentication type is characterized by: one-way authentication, password-based protocol, and does not use WEP keys?

A. EAP-TTLS
B. LEAP
C. EAP-TLS
D. EAP-MD5

Answer: D

Question 5.
Which EAP authentication type is characterized by the creation of an encrypted tunnel between the supplicant and the authentication server?

A. EAP-TTLS
B. LEAP
C. PEAP
D. EAP-TLS

Answer: A

Question 6.
An access point using an EAP protocol. A client device sends it an EAP-start message.

What is the FIRST action the access point takes?

A. AP enables port to authorized state.
B. AP detects client.
C. AP sends identity request to client.
D. AP enables port to unauthorized state.

Answer: B

Question 7.
Which EAP authentication type is characterized by: based on Secure Socket Layer protocol and used both server-side and client-side certificates?

A. EAP-MD5
B. LEAP
C. EAP-TTLS
D. EAP-TLS

Answer: D

Question 8.
Which of the following Layer 2 security solutions provides for unique and changing encryption keys with the addition of a flexible authentication protocol, and adds broadcast key rotation in some implementations?

A. 802.1x/EAP
B. Dynamic WEP
C. Static WEP
D. TKIP

Answer: A

Question 9.
Which of the following Layer 2 security solutions provides for unique and changing encryption keys so an intruder will never be able to collect enough data to crack the keys?

A. Dynamic WEP
B. TKIP
C. Static WEP
D. 802.1x/EAP

Answer: A

Question 10.
Which EAP authentication type is characterized by: any kind of supplicant credentials can be used; mutual authentication but only server-side digital certificates?

A. EAP-TLS
B. LEAP
C. PEAP
D. EAP-TTLS

Answer: D

Question 11.
Concerning RADIUS, what term refers to the design capability that allows multiple servers to run as a single computer, where each shares in the workload of the application?

A. Scalability
B. Clustering
C. Failover
D. Distributed

Answer: B

Question 12.
Which of the following statements is false concerning using switches to connect to the wired segment of a network?

A. Allows support for security and network management tools like VLANs.
B. Create full duplex connectivity at the bridge
C. Broadcast each frame entering any port to every other port
D. Create full duplex connectivity at the access point

Answer: C

Question 13.
The time required for a brute force attack to find an encryption key is exponentially raised when what is proportionally raised?

A. key length
B. variable rotation
C. number of rounds
D. key expansion

Answer: C

Question 14.
Though it has been highly publicized to have been broken, WEP offers a fair level of security, especially when compared with not using any protection at all. 

What is the shortest estimate of how long a hacker would need to crack WEP?

A. Within an hour
B. Several days.
C. Almost immediately.
D. Three to four hours

Answer: D

Question 15.
Which encryption scheme is the most well-known block cipher, and is extremely efficient on processors such as Intel's Pentium series?

A. RC4
B. DES/3DES
C. RC5
D. AES

Answer: C

Question 16.
Which of the following actions will not help customer support centers prevent social engineering?

A. Shred documents prior to throwing them away.
B. End-user verifies support center identity before giving password information.
C. Positively identify person calling help desk.
D. Use established, secure channels for passing security information.

Answer: B

Question 17.
Which of the following Layer 2 security solutions provides for unique and changing encryption keys so an intruder will never be able to collect enough data to crack the keys?

A. Dynamic WEP
B. TKIP
C. Static WEP
D. 802.lx/EAP

Answer: A

Question 18.
What purpose does eliminating availability of some services from a wireless segment of a network serve?

A. Speeds email communications
B. Creates more bandwidth for file sharing
C. Reduces security risk to the entire network
D. Forces end-users to comply with security program

Answer: C

Question 19.
Your company has not installed an intrusion detection system on your network. 

Which of the following actions would reduce the effectiveness of your manual network scan for rogue devices?

A. Search in the 2.4-2.5 GHz band.
B. Use a wireless packet analyzer for the scan.
C. Search all physical locations of the company.
D. Use an up-to-date listing of the MAC addresses and SSIDs of all authorized devices.

Answer: A

Question 20.
Which encryption mode has been selected for use in IEEE 802.11i?

A. RC6
B. 3DES
C. PSK
D. AES-CCMP

Answer: D


Google
 
Web www.certsbraindumps.com


Braindumps: Dumps for HP2-T17 Exam Brain Dump

Study Guides and Actual Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA


Advertise

Submit Braindumps

Forum

Tell A Friend

    Contact Us





Braindumps for "HP2-T17" Exam

HP ProLiant ML/DL/SL Servers [2010]

 Question 1.
Which processors use hyperthreading? (Select two.)

A. Intel single core processors
B. AMD dual core processors
C. AMD quad core processors
D. Inteldual core processors

Answer: A, D

Question 2.
How many memory channels are there in a 2 processor DDR3-based server?

A. 2 channels
B. 3channels
C. 4channels
D. 6 channels

Answer: D

Question 3.
On Intel Xeon 5500 Series (Nehalem) based servers, where is the memory controller located?

A. processor socket
B. processor core
C. HyperTransport Bus
D. Front Side Bus

Answer: B

Question 4.
Which components are under the control of Dynamic Power Management on Intel Xeon 5500 Series (Nehalem) based servers? (Select two.)

A. chipset
B. PCI-e cards
C. hard drives
D. CPU
E. fans

Answer: A, D

Question 5.
A server has four disks, each 146GB in size. They are configured as RAID 5. 

What is the logical drive size presented to the operating system?

A. 292GB
B. 438GB
C. 584GB
D. 730GB

Answer: B

Question 6.
Which operating system has support for the ZFS filesystem?

A. Sun Solaris
B. Windows Server 2008 R2x64 Enterprise Edition
C. Novell NetWare 6.5
D. Novell SLES 10

Answer: A

Question 7.
Which type of internal slot has been added to HP ProLiant G6-based servers for use by hypervisors?

A. Extreme Digital (xD)
B. Secure Digital (SD)
C. Compact Flash (CF)
D. PCI-express (PCIe)

Answer: B

Question 8.
For the Intel x5570Series processors in the HP ProLiant SL2x170z G6, what does the letter "x" preceding the processor model number indicate?

A. extreme performance
B. lowerwattage
C. turbo boost performance
D. highperformance/wattage

Answer: D

Question 9.
In which log are Array POST errors recorded?

A. Windows Event Log
B. Integrated Management Log
C. IPMI Log
D. Onboard Administrator Log

Answer: B

Question 10.
What information does the ADU provide? (Select three.)

A. firmwareversion
B. OEM hard drive vendor
C. RAID stripe size
D. HardwareErrorLogs
E. SmartArray driver version

Answer: A, C, D


Google
 
Web www.certsbraindumps.com


Study Guides and Real Exam Questions For Oracle OCP, MCSE, MCSA, CCNA, CompTIA





              Privacy Policy                   Disclaimer                    Feedback                    Term & Conditions

www.helpline4IT.com

ITCertKeys.com

Copyright © 2004 CertsBraindumps.com Inc. All rights reserved.