[Certification]/[FCF] Fortinet Certified Fundamentals

[FCF] Cybersecurity 2.0 - Lesson 07 : Wi-Fi (Quesion&Answer)

starterr 2024. 5. 19. 15:29
반응형

Q. Which two features of Wi-Fi Protected Access 3 (WPA3) strengthened security? (Choose two.)
Select one or more:

- The handshake for establishing connections became more secure.
- Complex passphrases were enforced.
- The encryption key size was lengthened.
- Digital signatures were introduced to help identify valid access points (APs).


Q.What is Wi-Fi?
Select one:

- Technology for radio wireless local area networks
- An Ethernet networking protocol
- Quality audio technology
- Fiber that makes wireless technology possible


Q. Which change that was introduced in Wi-Fi Protected Access 2 (WPA2) strengthened encrypted Wi-Fi communications?
Select one:

- Advanced Encryption Standard (AES) algorithm
- Encryption digital certificate
- Enforcement of stronger passphrases
- Hardware Security Modules (HSM)

반응형

 


Q. Wi-Fi is based on which standard?
Select one:

- ISO 5750
- RFC 826
- IEEE 802.11
- 10Base-T


Q. Which two security practices make your home wireless network safer? (Choose two.)
Select one or more:

- Keep your router firmware up to date.
- Install antivirus software on all Wi-Fi devices.
- Pick passphrases that are hard to guess.
- Consult with NIST as to the latest security strategies.

 

[FCF] Cybersecurity 2.0 - Lesson 06 : Content Filters (Quesion&Answer)

 

[FCF] Cybersecurity 2.0 - Lesson 06 : Content Filters (Quesion&Answer)

Q. Which three things do email filters check? (Choose three.) Select one or more: - Attachments - MAC addresses - The body of the message - Browser or application types  - Headers Q. Which Domain Name Service (DNS)-based co

infoofit.tistory.com

 

[FCF] Cybersecurity 2.0 - Lesson 08 : Endpoint Hardening Techniques (Quesion&Answer)

 

[FCF] Cybersecurity 2.0 - Lesson 08 : Endpoint Hardening Techniques (Quesion&Answer)

Q. Which hardening endpoint category does the principle of least privilege belong to? Select one: - Endpoint maintenance - Administrative controls- Endpoint monitoring - Local endpoint protection Q. Which technology has caused the

infoofit.tistory.com

 

 

반응형