Wireless Networks, Ch 3, Pt 1

Wireless Networks, Ch 3, Pt 1

University

15 Qs

quiz-placeholder

Similar activities

Access Control (Authorise vs Authenticate)

Access Control (Authorise vs Authenticate)

University

10 Qs

Quiz Mobile Dev

Quiz Mobile Dev

University

13 Qs

LINKS Cyber Youth Challenge - Round 1

LINKS Cyber Youth Challenge - Round 1

University

10 Qs

Django Fundamentals Quiz

Django Fundamentals Quiz

University

14 Qs

ITEC101 - Lesson 1 - Quiz 1

ITEC101 - Lesson 1 - Quiz 1

University

15 Qs

IAS 1 - QUIZ No. 1

IAS 1 - QUIZ No. 1

University

20 Qs

ETHICS IN ICT SOCIETY

ETHICS IN ICT SOCIETY

University

20 Qs

quiz

quiz

University

10 Qs

Wireless Networks, Ch 3, Pt 1

Wireless Networks, Ch 3, Pt 1

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Indira Dutta

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In the 802.1X authentication triangle, which component acts as the security guard that forwards authentication requests but does not make the final decision?

Supplicant

Authenticator

Authentication Server

NAC Policy Engine

2.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

During the initialization stage of 802.1X, why is the port kept in an unauthorized state?

To block all traffic until encryption keys are exchanged

To only allow authentication traffic until the user is validated

To prevent IP address assignment from DHCP

To test the client’s posture before allowing access

3.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which protocol framework does 802.1X rely on to carry credentials from the supplicant to the authentication server?

IPsec

TLS

EAP

GRE

4.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

A user enters valid credentials on a supplicant device, but the authenticator is not defined as a RADIUS client. What happens?

Access granted with limited privileges

Access granted with guest VLAN assignment

Authentication request ignored and connection fails

Authentication forwarded but not logged

5.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

What is the purpose of a RADIUS shared secret?

To encrypt all user data after authentication

To prevent man-in-the-middle attacks during TLS handshake

To encrypt sensitive fields in RADIUS messages (e.g., password)

To validate Active Directory group membership

6.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

In Microsoft NPS, which policy element defines the criteria an incoming request must match before the policy applies?

Constraints

Conditions

Settings

Attributes

7.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

Which attribute would a RADIUS server use to assign a fixed IP address to a user?

Idle-Timeout

Session-Timeout

Framed-IP-Address

Vendor-Specific Attribute

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?