exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 1106 discussion

Actual exam question from Cisco's 200-301
Question #: 1106
Topic #: 1
[All 200-301 Questions]

What is a characteristic of encryption in wireless networks?

  • A. identifies an access point on a WLAN
  • B. uses the password to connect to an access point
  • C. uses integrity checks to identify forgery attacks in the frame
  • D. uses authentication protocols to secure a network
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
[Removed]
Highly Voted 1 year, 4 months ago
Selected Answer: C
A. Incorrect. This is an SSID. B. Incorrect. This doesn't describe encryption, something that uses a password to connect to an access point is a client. So it's C or D. I don't think it's D because encryption doesn't "use authentication protocols", that's something like 802.1x. Which leaves us with C; but this isn't really a good description of encryption either. Still, I think it's the right answer. Why? Because Cisco refers to *cryptographic protocols* CCMP and GCMP as simply "encryption". These protocols involve integrity checks; CBC-MAC and GMAC respectively. Sources: https://www.cisco.com/c/en/us/support/docs/wireless/catalyst-9800-series-wireless-controllers/220712-configure-and-verify-wi-fi-6e-wlan-layer.html#toc-hId-394597201 https://en.wikipedia.org/wiki/Galois/Counter_Mode https://en.wikipedia.org/wiki/CCMP_(cryptography)
upvoted 8 times
exiledwl
7 months ago
A isn't correct for this question but you said it describes an SSID which is wrong, an SSID is not limited to a single access point
upvoted 2 times
...
...
JJY888
Highly Voted 1 year, 11 months ago
Selected Answer: C
C. uses integrity checks to identify forgery attacks in the frame. Encryption in wireless networks is a security mechanism used to protect data transmitted over wireless networks from unauthorized access. Encryption involves converting plain text into cipher text using a cryptographic algorithm and a key. The encrypted data is then transmitted over the wireless network and can only be decrypted by authorized recipients who possess the key. One of the features of encryption is the use of integrity checks to identify forgery attacks in the frame, ensuring that the data has not been tampered with during transmission.
upvoted 7 times
PaddyInNZ
1 year, 5 months ago
Reference please.
upvoted 1 times
...
JulesAZ
1 year, 2 months ago
Whilst investigating this answer from JJY888 which I thought was the best answer so far I found these notes https://networklessons.com/cisco/ccna-200-301/wireless-encryption-and-integrity https://networklessons.com/cisco/ccna-200-301/wireless-authentication-methods extract from 1st link In this lesson, we’ll take a look at some of the other algorithms and protocols to encrypt and protect the integrity of wireless traffic. That means D to me. Holy Jeez why cant any of these Q's be a little more clear!!
upvoted 1 times
...
...
Shaifalimittal02
Most Recent 7 months, 2 weeks ago
Selected Answer: C
Encryption in wireless networks ensures data confidentiality and integrity. Protocols like WPA2 use integrity checks (e.g., CCMP) to prevent forgery or modification of frames during transmission.
upvoted 1 times
...
[Removed]
1 year ago
Selected Answer: C
C is correct WPA3: GCMP provides encryption/MIC (Message Integrity Check) 802.1X authentication for "Enterprise Mode" or PSK for "Personal Mode"
upvoted 2 times
...
kalitwol
1 year ago
Selected Answer: C
Ccmp and gcmp have encryption and integrity
upvoted 2 times
...
[Removed]
1 year, 6 months ago
Selected Answer: C
Uses authentication protocols to secure the network: This option is not correct. Using authentication protocols to secure the network means authentication, not encryption.
upvoted 4 times
...
olofinluajoshua
1 year, 7 months ago
Similar answer from ChatGPT & Bard: C. uses integrity checks to identify forgery attacks in the frame Explanation: Encryption in wireless networks not only secures data by encoding it but also includes integrity checks to detect any unauthorized alterations or forgery of the data during transmission. This helps ensure the data's integrity and authenticity. The other options are not accurate descriptions of encryption in wireless networks: A. Identifying an access point is the role of an SSID, not encryption. B. Using a password for connection is related to authentication, not encryption. D. Authentication protocols are separ ate from encryption, although both are important security aspects in wireless networks. Encryption focuses on data confidentiality, while authentication verifies the identity of users or devices trying to connect to the network.
upvoted 1 times
...
4Lucky711
1 year, 8 months ago
C. uses integrity checks to identify forgery attacks in the frame --> IPsec D. uses authentication protocols to secure a network --> WPA、WPA2、WPA3... ChatGPT: The statement "uses integrity checks to identify forgery attacks in the frame" is incorrect because using integrity checks to identify forgery attacks is not a characteristic of encryption in wireless networks. Integrity checks are used to verify whether data has been altered or corrupted during transmission and are typically implemented by certain protocols or security mechanisms like IPsec. In wireless networks, encryption is primarily used to ensure data confidentiality, not integrity. WPA, WPA2, and WPA3 are encryption features in wireless networks. These protocols all use authentication and encryption to secure the wireless network, ensuring that only authorized users can connect and access the network. The encryption functionality prevents unauthorized users from eavesdropping on network communications, safeguarding users' personal information and data security.
upvoted 3 times
4Lucky711
1 year, 8 months ago
So I think D is correct.
upvoted 2 times
...
andrizo
1 year, 8 months ago
Well can't argue with chatgpt.
upvoted 3 times
...
...
Shri_Fcb10
1 year, 9 months ago
Selected Answer: D
D is correct. Wireless encryption uses authentication protocols to secure your wireless network https://www.geeksforgeeks.org/wireless-encryption-methods-in-cisco/
upvoted 2 times
...
sam225555
1 year, 9 months ago
Selected Answer: C
CC is correct
upvoted 2 times
...
NeoSam999
1 year, 10 months ago
Selected Answer: C
C is correct The correct characteristic of encryption in wireless networks is that it uses integrity checks to identify forgery attacks in the frame. Encryption is the process of encoding data to make it unreadable to unauthorized parties. In the context of wireless networks, encryption is used to secure the communication between devices and access points.
upvoted 2 times
...
[Removed]
1 year, 10 months ago
Selected Answer: D
I think it's D : Wireless encryption uses authentication protocols to secure your wireless network. A password or network key is required when a user or device attempts to connect.
upvoted 4 times
...
Bhrino
1 year, 11 months ago
Selected Answer: C
While I don't like the wording of any of these answers C sounds more right. It really used to stop people from intercepting messages sent over a wireless network. In a way it keeps the integrity of the message
upvoted 2 times
PaddyInNZ
1 year, 5 months ago
Yeah, nah. Integrity checks use hashes, not encryption.
upvoted 1 times
...
...
ac89l
1 year, 11 months ago
Selected Answer: D
Encryption can also be used to verify the identity of the communicating parties by requiring the use of authentication protocols, such as WPA2-PSK or EAP-TLS, to establish a secure connection.
upvoted 1 times
ac89l
1 year, 11 months ago
https://www.geeksforgeeks.org/wireless-encryption-methods-in-cisco/
upvoted 1 times
studying_1
1 year, 11 months ago
Answer is C, its encryption, D is about authentication
upvoted 3 times
...
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago