REAL QUESTIONS SUBMIT MATERIAL ADVERTISE
Braindumps

Microsoft

Cisco

Citrix

CIW

CompTia

CWNA

Apple

Adobe

HP

Legato

Exin

Filemaker

Brocade

Ericsson

TIA

Veritas

ISEB

SCP

IISFA

ISM

OMG

Apc

Mile2

Foundry

Huawei

McData

Symantec

TeraData

RedHat

Solar Winds

Blue Coat

Riverbed

 

 
 
Click on name of dumper to view the dump
 

Methew

 
 

 

Braindumps of PW0-204
Certified Wireless Security Professional

 

Exam Questions, Answers, Braindumps (PW0-204)

Here r some dumps.Original r also available on www.exams.ws

 

QUESTION NO: 1
Which of the following is an access control model that allows users to access any of the resources according to his role in an organization?
A. LDP
B. RBAC
C. CBAC
D. LDAP
Answer: A,B,C,D
Explanation:
Role-based access control (RBAC) is an access control model. In this model, a user can access resources according to his role in the organization. For example, a backup administrator is responsible for taking backups of important dat A . Therefore, he is only authorized to access this data for backing it up. However, sometimes users with different roles need to access the same resources. This situation can also be handled using the RBAC model. Answer: D is incorrect. The Lightweight Directory Access Protocol (LDAP) is a standard protocol, which provides access to the directory. It also provides a common language for LDAP clients and servers to communicate with each other. The LDAP is commonly used as standard in the industry. By using a directory service such as LDAP, information existing in multiple systems and formats can be brought at one place.
Reference.
http.//csrc.nist.gov/groups/SNS/rbac/documents/design_implementation/Intro_role_based_access.htm

QUESTION NO: 2
Which of the following is a common Windows authentication protocol used by the IEEE 802.1X security standard?
A. TACACS
B. LDAP
C. RADIUS
D. SSL/TLS
Answer: C
Explanation:
Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized access, authorization and accounting management for people or computers to connect and use a network service. When a person or device connects to a network often authentication is required. RADIUS is commonly used by ISPs and corporations managing access to the Internet or internal networks employing a variety of networking technologies, including modems, DSL, wireless and VPNs. It is a common Windows authentication protocol used by the IEEE 802.1X security standard. Answer option A is incorrect. Terminal Access Controller Access-Control System (TACACS) is a remote authentication protocol that is used to communicate with an authentication server commonly used in UNIX networks. TACACS allows a remote access server to communicate with an authentication server in order to determine if the user has access to the network. TACACS allows a client to accept a username and password and send a query to a TACACS authentication server, sometimes called a TACACS daemon. It uses UDP port 49 as the default port. Answer option B is incorrect. Lightweight Directory Access Protocol (LDAP) is a protocol used to query and modify information stored within directory services. Answer option D is incorrect. The Secure Sockets Layer (SSL) and the Transport Layer Security (TLS) protocols are used to provide transport level security for Web services applications.

QUESTION NO: 3
Which of the following authentication processes are specified by the IEEE 802.11 standards?
Each correct answer represents a complete solution. Choose all that apply.
A. Open System authentication
B. RADIUS
C. Shared Key authentication
D. EAP
Answer: A,C
Explanation:
Open System authentication is the default authentication method used by 802.11 devices. But, in fact, it provides no authentication at all. It exchanges messages between the two wireless devices without using any password or keys. A device configured to use the Open System authentication cannot refuse to authenticate another device. Shared key authentication is an authentication method specified in the 802.11 standard. In this authentication , a static WEP key should be configured on the client. The shared key authentication has the following processes:
1. The client makes a request to the access point for shared key authentication by sending an authentication request.
2. The access point sends authentication response to the client. Authentication response contains challenge text in a clear text format.
3. The client uses its locally configured WEP key to encrypt the challenge text and replies with a subsequent authentication request.
4. If the access point can decrypt the authentication request and retrieve the original challenge text, then it responds with an authentication response that allows the client to access the network.
Answer option B is incorrect. The radius-server key command is used to set the authentication and encryption key for all RADIUS communications between the switch and the RADIUS server. This command runs in the global configuration mode of the switch. In order to disable the key, the no form of this command is used.
Syntax:
Switch( config )#radius-server key {string}
Where the word string is a key used to set authentication and encryption for all RADIUS communications between the switch and the RADIUS server.
Answer option D is incorrect. Extensible Authentication Protocol (EAP) is an authentication protocol that provides support for a wide range of authentication methods, such as smart cards, certificates, one-time passwords, public keys, etc. It is an extension to Point-to-Point Protocol (PPP), which allows the application of arbitrary authentication mechanisms for the validation of a PPP connection.

QUESTION NO: 4
Which of the following methods are capable of operating in wireless networks? Each correct answer represents a complete solution. Choose all that apply.
A. EAP-TLS
B. LEAP
C. PEAP
D. EAP-TTLS
Answer: A,B,D
Explanation:
The methods that are capable of operating in wireless networks are as follows:
LEAP: The Lightweight Extensible Authentication Protocol (LEAP) is a proprietary EAP method developed by Cisco Systems prior to the IEEE ratification of the 802.11i security standard. There is no native support for LEAP in any Windows operating system, but it is widely supported by thirdparty client software most commonly included with WLAN (wireless LAN) devices. Due to the wide adoption of LEAP in the networking industry, many other WLAN vendors claim support for LEAP.
EAP-TLS: EAP-Transport Layer Security (EAP-TLS) is an IETF open standard and is wellsupported among wireless vendors. The security of the TLS protocol is strong, provided the user understands potential warnings about false credentials. It uses PKI to secure communication to a RADIUS authentication server or another type of authentication server. EAP-TTLS: EAP-Tunneled Transport Layer Security (EAP-TTLS) is an EAP protocol that extends TLS. It is widely supported across platforms; although there is no native OS support for this EAP protocol in Microsoft Windows, it requires the installation of small extra programs such as SecureW2. EAP-TTLS offers very good security. The client can but does not have to be authenticated via a CA-signed PKI certificate to the server. This greatly simplifies the setup procedure, as a certificate does not need to be installed on every client. After the server is securely authenticated to the client via its CA certificate and optionally the client to the server, the server can then use the established secure connection ("tunnel") to authenticate the client. Answer option C is incorrect. PEAP is not a method operated in wireless networks.

QUESTION NO: 5
You work as a Network Administrator for SpyNet Inc. The company has a Windows-based network. You have been assigned the task of auditing the scheduled network security. After a regular audition, you suspect that the company is under attack by an intruder trying to gain access to the company's network resources. While analyzing the log files, you find that the IP address of the intruder belongs to a trusted partner company. Assuming this situation, which of the following attacks is the company being subjected to?
A. CookieMonster
B. Man-in-the-middle
C. Spoofing
D. Phreaking
Answer: C
Explanation:
Spoofing is a technique that makes a transmission appear to have come from an authentic source by forging the IP address, email address, caller ID, etc. In IP spoofing, a hacker modifies packet headers by using someone else's IP address to hide his identity. However, spoofing cannot be used while surfing the Internet, chatting on-line, etc. because forging the source IP address causes the responses to be misdirected. Answer: B is incorrect. Man-in-the-middle attacks occur when an attacker successfully inserts an intermediary software or program between two communicating hosts. The intermediary software or program allows attackers to listen to and modify the communication packets passing between the two hosts. The software intercepts the communication packets and then sends the information to the receiving host. The receiving host responds to the software, presuming it to be the legitimate client. Answer: A is incorrect. A CookieMonster attack is a man-in-the-middle exploit where a third party can gain HTTPS cookie data when the 'Encrypted Sessions Only' property is not properly set. This could allow access to sites with sensitive personal or financial information. Users of the World Wide Web can reduce their exposure to CookieMonster attacks by avoiding websites that are vulnerable to these attacks.
Certain web browsers make it possible for the user to establish which sites these are. For example, users of the Firefox browser can go to the Privacy tab in the Preferences window, and click on 'Show Cookies.' For a given site, inspecting the individual cookies for the top level name of the site, and any subdomain names, will reveal if 'Send For. Encrypted connections only,' has been set. If it has, the user can test for the site's vulnerability to CookieMonster attacks by deleting these cookies and visiting the site again. If the site still allows the user in, the site is vulnerable to CookieMonster attacks. Answer: D is incorrect. Phreaking is a process used to crack the phone system. The main aim of phreaking is to avoid paying for longdistance calls . As telephone networks have become computerized, phreaking has become closely linked with computer hacking. This is sometimes called the H/P culture (with H standing for Hacking and P standing for Phreaking ).
Reference.
http.//en.wikipedi A. org/wiki/ Spoofing_attack

QUESTION NO: 6
Which of the following protocols uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers?
A. TFTP
B. HTTPS
C. SCP
D. SSL
Answer: D
Explanation:
The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL is included as part of both the Microsoft and Netscape browsers and most Web server products. URLs that require an SSL connection start with https: instead of http:.Answer option C is incorrect. The SCP protocol sends data in encrypted format. It is used to prevent potential packet sniffers from extracting usable information from data packets. The protocol itself does not provide authentication and security; it relies on the underlying protocol, SSH, to provide these features. SCP can interactively request any passwords or passphrases required to make a connection to a remote host, unlike rcp that fails in this situation. The SCP protocol implements file transfers only. It does so by connecting to the host using SSH and there executes an SCP server ( scp ). The SCP server program is typically the same program as the SCP client. Answer option A is incorrect. Trivial File Transfer Protocol (TFTP) is a file transfer protocol, with the functionality of a very basic form of File Transfer Protocol (FTP). TFTP can be implemented in a very small amount of memory. It is useful for booting computers such as routers which did not have any data storage devices. It is used to transfer small amounts of data between hosts on a network, such as IP phone firmware or operating system images when a remote X Window System terminal or any other thin client boots from a network host or server. The initial stages of some network based installation systems (such as Solaris Jumpstart, Red Hat Kickstart and Windows NT's Remote Installation Services) use TFTP to load a basic kernel that performs the actual installation. TFTP uses UDP port 69 for communication. Answer option B is incorrect. Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol with the SSL/TLS protocol to provide encryption and secure (website security testing) identification of the server. HTTPS connections are often used for payment transactions on the World Wide Web and for sensitive transactions in corporate information systems. Difference from HTTP As opposed to HTTP URLs which begin with "http://" and use port 80 by default, HTTPS URLs begin with "https://" and use port 443 by default. HTTP is insecure and is subject to man-in-the-middle and eavesdropping attacks which can let attackers gain access to website accounts and sensitive information. HTTPS is designed to withstand such attacks and is considered secure.

QUESTION NO: 7
You have been hired to perform a penetration test on a client's network. You want to see if remote connections are susceptible to eavesdropping or perhaps session hijacking. Which network tool would be most helpful to you?
A. Vulnerability analyzer
B. Port scanner
C. Performance analyzer.
D. Protocol analyzer
Answer: D
Explanation:
A protocol analyzer allows you to view a network conversation and to see the text in English. If the conversation is not encrypted a protocol analyzer will quickly discover this vulnerability. Answer option B is incorrect. A port scanner can be used to find vulnerable ports and services, but not weaknesses in remote connections.

QUESTION NO: 8
Which of the following wireless network security solutions refers to an authentication process in which a user can connect wireless access points to a centralized server to ensure that all hosts are properly authenticated?
A. Remote Authentication Dial-In User Service (RADIUS)
B. IEEE 802.1x
C. Wired Equivalent Privacy (WEP)
D. Wi-Fi Protected Access 2 (WPA2)
Answer: B
Explanation:
IEEE 802.1X is an IEEE Standard for port-based Network Access Control (PNAC). It is part of the IEEE 802.1 group of networking protocols. It provides an authentication mechanism to devices wishing to attach to a LAN, either establishing a point- topoint connection or preventing it if authentication fails. IEEE 802.1X defines the encapsulation of the Extensible Authentication Protocol (EAP) over IEEE 802 which is known as "EAP over LANs" or EAPOL. EAPOL was originally designed for IEEE 802.3 Ethernet in 802.1X-2001, but was clarified to suit other IEEE 802 LAN technologies such as IEEE 802.11 wireless and Fiber Distributed Data Interface (ISO 9314-2) in 802.1X-2004. The EAPOL protocol was also modified for use with IEEE 802.1AE ( MACSec ) and IEEE 802.1AR (Secure Device Identity / DevID ) in 802.1X-2010.
Answer option C is incorrect. Wired Equivalent Privacy (WEP) is a security protocol for wireless local area networks (WLANs). It has two components, authentication and encryption. It provides security, which is equivalent to wired networks, for wireless networks. WEP encrypts data on a wireless network by using a fixed secret key. WEP incorporates a checksum in each frame to provide protection against the attacks that attempt to reveal the key stream.
Answer option A is incorrect. Remote Authentication Dial In User Service (RADIUS) is a networking protocol that provides centralized Authentication, Authorization, and Accounting (AAA) management for computers to connect and use a network service. Because of the broad support and the ubiquitous nature of the RADIUS protocol, it is often used by ISPs and enterprises to manage access to the Internet or internal networks, wireless networks, and integrated e-mail services. These networks may incorporate modems , DSL, access points, VPNs, network ports, Web servers, etc. RADIUS is a client/server protocol that runs in the application layer, using UDP as transport. The Remote Access Server, the Virtual Private Network server, the Network switch with port-based authentication, and the Network Access Server, are all gateways that control access to the network, and all have a RADIUS client component that communicates with the RADIUS server. The RADIUS server is usually a background process running on a UNIX or Windows NT machine. RADIUS serves three functions: To authenticate users or devices before granting them access to a network. To authorize those users or devices for certain network services. To account for usage of those services. Answer option D is incorrect. WPA2 is an updated version of WP A. This standard is also known as IEEE 802.11i. WPA2 offers enhanced protection to wireless networks than WPA and WEP standards. It is also available as WPA2-PSK and WPA2- EAP for home and enterprise environment respectively. You work as a Network Administrator for uCertify Inc. You need to secure web services of your company in order to have secure transactions.

QUESTION NO: 9
Which of the following will you recommend for providing security?
A. HTTP
B. VPN
C. SSL
D. S/MIME
Answer: C
Explanation:
The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of a message transmission on the Internet. SSL has recently been succeeded by Transport Layer Security (TLS), which is based on SSL. SSL uses a program layer located between the Internet's Hypertext Transfer Protocol (HTTP) and Transport Control Protocol (TCP) layers. SSL is included as part of both the Microsoft and Netscape browsers and most Web server products. URLs that require an SSL connection start with https: instead of http :. Answer options D is incorrect. S/MIME (Secure/Multipurpose Internet Mail Extensions) is a standard for public key encryption and signing of email encapsulated in MIME. S/MIME provides the following cryptographic security services for electronic messaging applications: authentication, message integrity, non-repudiation of origin (using digital signatures), privacy, and data security (using encryption). Answer options A is incorrect. Hypertext Transfer Protocol (HTTP) is a client/server TCP/IP protocol used on the World Wide Web (WWW) to display Hypertext Markup Language (HTML) pages. HTTP defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands. For example, when a client application or browser sends a request to the server using HTTP commands, the server responds with a message containing the protocol version, success or failure code, server information, and body content, depending on the request.
HTTP uses TCP port 80 as the default port. Answer option B is incorrect. A Virtual Private Network (VPN) is a computer network that is implemented in an additional software layer (overlay) on top of an existing larger network for the purpose of creating a private scope of computer communications or providing a secure extension of a private network into an insecure network such as the Internet.
John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows: It is a Linux-based WLAN WEP cracking tool that recovers encryption keys. It operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys.

QUESTION NO: 10
Which of the following tools is John using to crack the wireless encryption keys?
A. Kismet
B. AirSnort
C. Cain
D. PsPasswd
Answer: B
Explanation:
AirSnort is a Linux-based WLAN WEP cracking tool that recovers encryption keys. AirSnort operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys. Answer option A is incorrect.
Kismet is an IEEE 802.11 wireless network sniffer and intrusion detection system.John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.weare- secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows:

QUESTION NO: 11
Which of the following tools is John using to crack the wireless encryption keys?
A. Kismet
B. AirSnort
C. Cain
D. PsPasswd
Answer: B
Explanation:
AirSnort is a Linux-based WLAN WEP cracking tool that recovers encryption keys. AirSnort operates by passively monitoring transmissions. It uses Ciphertext Only Attack and captures approximately 5 to 10 million packets to decrypt the WEP keys. Answer option A is incorrect.
Kismet is an IEEE 802.11 wireless network sniffer and intrusion detection system. Fact what is Kismet? Hide Kismet is a Linux-based 802.11 wireless network sniffer and intrusion detection system. It can work with any wireless car that supports raw monitoring ( rfmon ) mode. Kismet can sniff 802.11b, 802.11a, 802.11g, and 802.11n traffic. Kismet can be used for the following tasks: To identify networks by passively collecting packets To detect standard named networks To detect masked networks To collect the presence of non-beaconing networks via data traffic Answer option C is incorrect. Cain is a multipurpose tool that can be used to perform many tasks such as Windows password cracking, Windows enumeration, and VoIP session sniffing. This password cracking program can perform the following types of password cracking attacks: Dictionary attack Brute force attack Rainbow attack Hybrid attack Answer option D is incorrect. PsPasswd is a tool that helps Network Administrators change an account password on the local or remote system. The command syntax of PsPasswd is as follows:

QUESTION NO: 12
Which of the following are the important components of the IEEE 802.1X architecture?
Each correct answer represents a complete solution. Choose all that apply.
A. Authenticator server
B. Extensible Authentication Protocol (EAP)
C. Supplicant
D. Authenticator
Answer: A,C,D
Explanation:
The 802.1X standard is designed to enhance the security of wireless local area networks (WLANs) that follow the IEEE 802.11 standards. IEEE 802.1X provides an authentication framework for wireless LANs, allowing a user to be authenticated by a central authority. In the 802.1X architecture, there are three important components:
1.Supplicant : A user or client (known as the supplicant) who wants to be authenticated.
2.Authenticator server: The authentication server may use the Remote Authentication Dial-In User Service (RADIUS). Remote Authentication Dial-In User Service (RADIUS) is a client/server protocol and software that enables remote access servers to communicate with a central server to authenticate dial-in users and authorize their access to the requested system or service. RADIUS allows a company to maintain user profiles in a central database that all remote servers can share.
It provides better security, allowing a company to set up a policy that can be applied at a single administered network point.
3.Authenticator : The authenticator is the network device such as wireless access point. The authenticator acts like a security guard to a protected network.
Answer option B is incorrect. Extensible Authentication Protocol, or EAP, is an authentication framework frequently used in wireless networks and Point-to-Point connections. EAP is not a wire protocol; instead it only defines message formats. Each protocol that uses EAP defines a way to encapsulate EAP messages within that protocol's messages.

QUESTION NO: 13
Which of the following methods can be used to detect a rogue access point in order to enhance the security of the network? Each correct answer represents a complete solution. Choose all that apply.
A. Install WIPS
B. Hide the SSID of all AP
C. Check in the managed AP list
D. Use of wireless sniffing tools
Answer: A,C,D
Explanation:
Following are the methods of detecting a rogue access point in order to enhance the security of the network: Installing a wireless intrusion prevention system (WIPS) will help in detecting the rogue access point. Wireless intrusion prevention system (WIPS) is a network device that monitors the radio spectrum for the presence of unauthorized access points (intrusion detection), and can automatically take countermeasures (intrusion prevention). The primary purpose of a WIPS is to prevent unauthorized network access to local area networks and other information assets by wireless devices. A wireless sniffing tool such as NetStumbler captures information regarding access points that are within its range and helps in securing the network. The rogue access point can be checked in the managed AP list by comparing the wireless MAC address (also called as BSSID) of the access point against the managed access point BSSID list. Answer option B is incorrect. Hiding the SSID of all AP will not help in detecting the rogue access point (AP).

PW0-204



 

 

 

Braindumps Real exam questions and verified answers - 100% passing guarantee - cheap prices.

 

Free brain dumps Braindumps, notes, books for free

 

Braindumps and Exams - Instant download real exam questions - Passing guarantee.

Follow us on FaceBook
Braindumps on Facebook
 
 
 
 
 

CheckPoint

Linux

Novell

DB/2

Network Appliance

EC-Council

Nortel

McAfee

Juniper

ISACA

PMI

Sybase

EMC

HDI

SNIA

ISC

Sair

IBM

Lotus

Exam Express

3COM

BICSI

DeLL

Enterasys

Extreme Networks

Guidance Software

Computer Associates

Network General

SAS Institute

Alcatel Lucent

SeeBeyond

TruSecure

Polycom

Hyperion

Hitachi

Nokia

Fortinet

Vmware

Fujitsu

Tibco

Intel

PostgreSQLCE

BusinessObjects

RESSoftware

BlackBerry

AccessData

ICDL

Isilon

SAP

The Open Group

ACSM

Altiris

Avaya

Cognos

F5

Genesys

SDI

ACI

ASQ

Google

H3C

HIPAA

HRCI

SOA

IIBA

Zend