exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam

Exam 200-301 topic 1 question 1270 discussion

Actual exam question from Cisco's 200-301
Question #: 1270
Topic #: 1
[All 200-301 Questions]

What is a characteristic of encryption in wireless networks?

  • A. used to ensure data integrity
  • B. uses 802.1x as the standard encoding method
  • C. uses protocols such as TKIP and CCMP to secure data
  • D. only works with the 5Ghz frequency
Show Suggested Answer Hide Answer
Suggested Answer: C 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
16BitRun
Highly Voted 10 months ago
C. uses protocols such as TKIP and CCMP to secure data Explanation: Encryption in wireless networks is a security measure designed to protect the confidentiality of data as it is transmitted over the airwaves. The widely used encryption protocols for securing wireless communications are TKIP (Temporal Key Integrity Protocol) and CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol). TKIP is commonly used with WPA (Wi-Fi Protected Access), and CCMP is used with WPA2 and WPA3. These protocols ensure that data transmitted between a wireless client and an access point is encrypted, preventing unauthorized parties from intercepting and deciphering the information.
upvoted 7 times
16BitRun
10 months ago
The other options are not accurate: A. While encryption does contribute to overall security, its primary purpose is to maintain the confidentiality of data, not necessarily to ensure data integrity. Integrity is typically addressed through other means such as hashing. B. 802.1x is a standard for port-based network access control and is not specifically an encoding method for wireless encryption. D. Encryption is not limited to a specific frequency band, and it can be implemented on both the 2.4 GHz and 5 GHz frequency bands used by wireless networks. It is not exclusive to 5 GHz.
upvoted 6 times
...
...
[Removed]
Most Recent 6 months, 2 weeks ago
Selected Answer: C
C is correct
upvoted 2 times
...
lmmujsi
7 months ago
C. uses protocols such as TKIP and CCMP to secure data
upvoted 1 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago