Text Material Preview
CWSP-207 CWNP Wireless Security Professional (CWSP) exam dumps questions are the best material for you to test all the related CWNP exam topics. By using the CWSP-207 exam dumps questions and practicing your skills, you can increase your confidence and chances of passing the CWSP-207 exam. Features of Dumpsinfo’s products Instant Download Free Update in 3 Months Money back guarantee PDF and Software 24/7 Customer Support Besides, Dumpsinfo also provides unlimited access. You can get all Dumpsinfo files at lowest price. CWNP Wireless Security Professional (CWSP) CWSP-207 exam free dumps questions are available below for you to study. Full version: CWSP-207 Exam Dumps Questions 1.Which of these types of EAP require a client-side X.509 digital certificate to be used as the supplicant credentials? (Choose all that apply.) A. EAP-TTLS B. EAP-PEAPv0 (EAP-MSCHAPv2) C. EAP-PEAPv0 (EAP-TLS) D. EAP-FAST E. EAP-TLS (privacy mode) F. EAP-TLS (nonprivacy mode) Answer: CEF 2.Which of these roaming methods requires the use of FT Action frames? A. Over-the-air fast BSS transition 1 / 16 https://www.dumpsinfo.com/unlimited-access/ https://www.dumpsinfo.com/exam/cwsp-207 B. Over-the-WDS fast BSS transition C. Over-the-DS fast BSS transition D. Over-the-WLS fast BSS transition Answer: C 3.You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What security solution is represented? A. 802.1X/EAP-TTLS B. Open 802.11 authentication with IPSec C. 802.1X/PEAPv0/MS-CHAPv2 D. WPA2-Personal with AES-CCMP E. EAP-MD5 Answer: B 4.When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what secure protocol may be used by the WNMS to issue configuration changes to APs? A. IPSec/ESP B. TFTP C. 802.1X/EAP D. SNMPv3 E. PPTP Answer: D 5.While performing a manual scan of your environment using a spectrum analyzer on a laptop computer, you notice a signal in the real time FFT view. The signal is characterized by having peak power centered on channel 11 with an approximate width of 20 MHz at its peak. The signal widens to approximately 40 MHz after it has weakened by about 30 dB. What kind of signal is displayed in the spectrum analyzer? A. A frequency hopping device is being used as a signal jammer in 5 GHz B. A low-power wideband RF attack is in progress in 2.4 GHz, causing significant 802.11 interference C. An 802.11g AP operating normally in 2.4 GHz D. An 802.11a AP operating normally in 5 GHz Answer: C 6.TKIP can be used with which of the following? (Choose all that apply.) A. WEP B. WPA-Personal C. WPA-Enterprise D. WPA-2 Personal E. WPA-2 Enterprise F. 802.11-2012 (RSN) Answer: BCDEF 2 / 16 https://www.dumpsinfo.com/ 7.The ___________ key is used to encrypt/decrypt unicast 802.11 frames, and the ___________ key is used to encrypt/decrypt broadcast and multicast 802.11 frames. A. Group Master, Group Temporal B. Pairwise Master, Group Temporal C. Master Session, Pairwise Transient D. Pairwise Transient, Group Temporal E. Pairwise Master, Pairwise Transient Answer: D 8. 802.11i 9.Which of these types of EAP is designed for a Fixed Mobile Convergence (FMC) authentication solution over an 802.11 WLAN and a 3G cellular telephone network? A. EAP-SIM B. EAP-GTC C. EAP-PEAPv0 (EAP-TLS) D. EAP-AKA E. EAP-Fortress F. EAP-TTLS Answer: D 10.Your WIDS detected a rogue AP and sent an email alert to an administrator in the same building in which the rogue was detected. The administrator reads the email and does not respond to the alarm, but rather waits until after lunch and then calls you for direction. This delay has allowed the device to be on the network for over an hour and placed the organization’s private information at risk. What is the most likely reason the administrator took no action? A. The WIDS detected the rogue, and no further action was required. B. You are the only person who knows how to deal with rogue APs. C. The security policy lacks response procedures. D. Only a properly configured WIPS can mitigate a rogue AP. Answer: C 11.Identify the protocols that are normally used to manage WLAN infrastructure devices securely. (Choose all that apply.) A. HTTPS B. Telnet C. SSH2 D. TLS E. IPsec F. CCMP/AES Answer: AC 12.When an RS-232 serial cable is connected between a service laptop and SC Series hardware, which parameters need to be selected? A. Baud Rate = 9600, Parity = None Data Bits = 8, Stop Bits =1, Flow Control = XON/XOFF B. Baud Rate = 115200, Parity = None Data Bits = 8, Stop Bits = 1, Flow Control = XON/XOFF C. Baud Rate = 115200, Parity =None Data Bits = 8, Stop Bits = 1, Flow Control = None 3 / 16 https://www.dumpsinfo.com/ D. Baud Rate = 115200, Parity = Even Data Bits = 8, Stop Bits = 1, Flow Control = XON/XOFF Answer: A 13.What does 802.1X/EAP provide when implemented for WLAN security? (Choose all that apply.) A. Access to network resources B. Verification of access point credentials C. Dynamic authentication D. Dynamic encryption-key generation E. Verification of user credentials Answer: ADE 14.A WIDS/WIPS consists of which of the following components? (Choose two.) A. WIDS/WIPS server B. Midspan injector C. Sensors D. MDM server E. SNMP server Answer: AC 15.When considering the 4-Way Handshake that is used to create dynamic encryption keys, what is the main difference between 802.1X/EAP and PSK authentication? (Choose all that apply.) A. 802.1X/EAP supplicants all use the same PMK. B. Clients that use PSK authentication all use the same PTK. C. 802.1X/EAP supplicants all use a different PMK. D. Clients that use PSK authentication all use a different PTK. E. 802.1X/EAP supplicants all use a different PTK. F. Clients that use PSK authentication all use the same PMK. Answer: CF 16.Joe's new laptop is experiencing difficulty connecting to ABC Company's 802.11 WLAN using 802.1X/EAP PEAPv0. The company's wireless network administrator assured Joe that his laptop was authorized in the WIPS management console for connectivity to ABC's network before it was given to him. The WIPS termination policy includes alarms for rogue stations, roque APs, DoS attacks and unauthorized roaming. What is a likely reason that Joe cannot connect to the network? A. Joe disabled his laptop's integrated 802.11 radio and is using a personal PC card radio with a different chipset, drivers, and client utilities. B. Joe's integrated 802.11 radio is sending multiple Probe Request frames on each channel. C. An ASLEAP attack has been detected on APs to which Joe's laptop was trying to associate. The WIPS responded by disabling the APs. D. Joe configured his 802.11 radio card to transmit at 100 mW to increase his SNR. The WIPS is detecting this much output power as a DoS attack. Answer: A 17.In a guest firewall policy, which IP networks should be restricted? (Choose two.) A. 172.16.0.0/12 4 / 16 https://www.dumpsinfo.com/ B. 20.0.0.0/8 C. 192.16.0.0/16 D. 172.10.0.0/24 E. 10.0.0.0/8 Answer: AE 18.Another auditor tells you that they use the same toolkit to conduct audits as they use to conduct WLAN site survey work. Why would they do this since they are performing two different types of work? A. Many auditors cannot afford a proper auditing kit. B. The two types of work are similar enough to use the same tools. C. They have never been shown how to conduct an audit. D. Their scope of work document limits them to passive auditing. Answer: B 19.Which of these encryption technologies have been cracked? (Choose all that apply.) A. 64-bit static WEP B. 128-bit Dynamic WEP C. CCMP/AES D. 128-bit static WEP Answer: ABD 20.Given: XYZ Company has recently installed an 802.11ac WLAN. The company needs the ability to control access to networkservices, such as file shares, intranet web servers, and Internet access based on an employee's job responsibilities. What WLAN security solution meets this requirement? A. An autonomous AP system with MAC filters B. WPA2-Personal with support for LDAP queries C. A VPN server with multiple DHCP scopes D. A WLAN controller with RBAC features E. A WLAN router with wireless VLAN support Answer: D 21.Brooke is using an integrated WIDS/WIPS solution with APs as part-time sensors to protect against rogue APs. Brooke has deployed VoWiFi phones and wants to ensure maximum performance. Which WIDS/WIPS configuration setting is advisable when APs function as part-time WIPS sensors? A. Disable spectrum analysis B. Disable rouge containment C. Suspend off-channel scanning based on QoS priority markings D. Suspend rogue containment Answer: C 22.When 802.1X/EAP is properly deployed, which of these external databases can a RADIUS server query for proxy authentication? A. Active Directory B. E-Directory 5 / 16 https://www.dumpsinfo.com/ C. Open Directory D. All of the above Answer: D 23.Which wireless security standards and certifications call for the use of CCMP/AES encryption? (Choose all that apply.) A. WPA B. 802.11-2012 C. 802.1X D. WPA2 E. 802.11 legacy Answer: BD 24.Which of these types of EAP are susceptible to offline dictionary attacks? (Choose all that apply.) A. EAP-SIM B. EAP-MD5 C. EAP-PEAPv0 (EAP-TLS) D. EAP-FAST E. EAP-PEAPv1 (EAP-GTC) F. EAP-LEAP Answer: BF 25.The network administrator of the WonderPuppy Coffee Company calls up the support hotline for his WLAN vendor and informs the support personnel that the WLAN is broken. The support personnel ask the customer a series of questions so that they can isolate and identify the cause of a potential problem. What are some common Troubleshooting 101 questions? (Choose all that apply.) A. When is the problem happening? B. What is your favorite color? C. What is your quest? D. Does the problem reoccur or did it just happen once? E. Did you make any changes recently? Answer: ADE 26.Which method of guest management can be used by a company to gather valuable personal information about guest users? A. Social login B. Kiosk mode C. Receptionist registration D. Self-registration E. Employee sponsorship Answer: A 27.In a robust security network (RSN), which 802.11 management frames are used by an access point to inform client STAs about the RSNA security capabilities of the access point and effectively the BSS? (Choose all that apply.) A. Beacon management frame 6 / 16 https://www.dumpsinfo.com/ B. Probe request frame C. Probe response frame D. Association request frame E. Reassociation response frame F. Reassociation request frame G. Association response frame Answer: AC 28.An AP advertising an 802.1X/EAP employee SSID along with a guest SSID is considered to be operating what type of network device? A. Core B. Distribution C. Access D. Network layer E. Session layer Answer: C 29.While conducting a routine security analysis of your company’s network, you discover an unauthorized access point installed on the network under the vice president’s desk. What should you do in dealing with the rogue device since the vice president is likely to have placed the device there to provide coverage in the office for her own wireless devices? A. Remove the device and take it to the IT office for forensics. B. Unplug the device from the network but leave it in place. C. Follow the procedures for rogue device management in company policy. D. Ask the vice president what she would like done with the device. Answer: C 30.Which one of the following describes the correct hierarchy of 802.1X authentication key derivation? A. The MSK is generated from the 802.1X/EAP authentication. The PMK is derived from the MSK. The PTK is derived from the PMK, and the keys used for actual data encryption are a part of the PTK. B. If passphrase-based client authentication is used by the EAP type, the PMK is mapped directly from the user's passphrase. The PMK is then used during the 4-way handshake to create data encryption keys. C. After successful EAP authentication, the RADIUS server generates a PMK. A separate key, the MSK, is derived from the AAA key and is hashed with the PMK to create the PTK and GTK. D. The PMK is generated from a successful mutual EAP authentication. When mutual authentication is not used, an MSK is created. Either of these two keys may be used to derive the temporal data encryption keys during the 4-way handshake. Answer: A 31.Given: You are using a Wireless Aggregator utility to combine multiple packet captures. One capture exists for each of channels 1, 6 and 11. What kind of troubleshooting are you likely performing with such a tool? A. Wireless adapter failure analysis. B. Interference source location. C. Fast secure roaming problems. D. Narrowband DoS attack detection. 7 / 16 https://www.dumpsinfo.com/ Answer: C 32.In a point-to-point bridge environment where 802.1X/EAP is used for bridge authentication, what device in the network acts as the 802.1X supplicant? A. Nonroot bridge B. WLAN controller C. Root bridge D. RADIUS server E. Layer 3 core switch Answer: A 33.What port needs to be open on a firewall to permit RadSec protocol authentication and accounting traffic? A. UDP 1812 B. UDP 1813 C. TCP 369 D. TCP 636 E. TCP 2083 Answer: E 34.What are some of the different types and form factors of WIPS servers? (Choose all that apply.) A. WLAN controller B. Cloud network management server C. Standalone appliance D. On-premises network management server E. Virtual appliance F. All of the above Answer: F 35.What wireless authentication technologies may build a TLS tunnel between the supplicant and the authentication server before passing client authentication credentials to the authentication server? (Choose 3) A. EAP-MD5 B. EAP-TLS C. LEAP D. PEAPv0/MSCHAPv2 E. EAP-TTLS Answer: BDE 36.Which of these authentication methods does not require any WLAN client configuration and is sometimes bound together with other authentication methods? A. Hologram authentication B. Captive web portal authentication C. MAC authentication D. TSA authentication E. 802.1X/EAP authentication Answer: C 8 / 16 https://www.dumpsinfo.com/ 37.Which of these inner authentication EAP types is intended to be used with an 802.1X framework that uses security token devices as the supplicant credentials? (Choose all that apply.) A. EAP-GTC B. EAP-MSCHAPv2 C. EAP-POTP D. EAP-LEAP E. EAP-PEAP F. EAP-TTLS Answer: AC 38.What are some of the risks if a rogue device goes undetected? A. Data theft B. Data destruction C. Loss of network services D. Data insertion E. Third-party attacks F. All of the above Answer: F 39.You have been tasked with configuring a secure WLAN for 500 APs at the corporate offices. All the APs and employee Windows laptops have been configured for 802.1X using PEAPv1 (EAP-GTC). The domain user accounts are failing authentication with every attempt. After viewing the graphic shown here, determine the possible causes of the problem. (Choose all that apply.) A. The Windows OS laptops have the root certificate installed in the incorrect store. 9 / 16 https://www.dumpsinfo.com/ B. The Windows OS laptops’ supplicant has been configured for machine authentication. C. The shared secret does not match between the AP and the RADIUS server. D. The RADIUS cannot query LDAP. E. The Windows OS laptops have been configured for PEAPv0 (EAP-MSCHAPv2). F. The server certificate has expired. Answer: AF 40.What type of files are used by the MDM profiles for Apple Mac OS and iOS devices? (Choose all that apply.) A. HTTP B. XML C. JAVA D. PHP E. Python Answer: B 41.Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.) A. Wi-Fi phishing B. Happy AP attack C. Peer-to-peer attackD. Malicious eavesdropping E. 802.11 reverse ARP attack F. Man-in-the-middle G. Wireless hijacking Answer: ACDFG 42.In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce? (Choose 2) A. They are used to pad Message 1 and Message 2 so each frame contains the same number of bytes. B. The IEEE 802.11 standard requires that all encrypted frames contain a nonce to serve as a Message Integrity Check (MIC). C. They are added together and used as the GMK, from which the GTK is derived. D. They are input values used in the derivation of the Pairwise Transient Key. E. They allow the participating STAs to create dynamic keys while avoiding sending unicast encryption keys across the wireless medium. Answer: DE 43.Which of the following is not a standard or amendment created by the IEEE? (Choose all that apply.) A. 802.11X B. 802.1x C. 802.3af D. 802.11N E. 802.11g Answer: ABD 10 / 16 https://www.dumpsinfo.com/ 44.The following numbered items show some of the contents of each of the four frames exchanged during the 4- way handshake: 45.What are some of the major differences between SNMPv3 and SNMPv2? (Choose all that apply.) A. SNMPv3 requires username/passwords. B. SNMPv3 requires community strings. C. SNMPv3 uses 56-bit DES encryption to encrypt packets. D. SNMPv3 uses 128-bit AES encryption to encrypt packets. Answer: AC 46.What protocol, listed here, allows a network manager to securely administer the network? A. TFTP B. Telnet C. HTTPS D. SNMPv2 Answer: C 47.What are some of the methods used by WIPS vendors to determine if a rogue device is connected to the wired network infrastructure? (Choose all that apply.) A. TTL packet analysis B. RF triangulation C. Signature analysis D. Behavioral analysis E. MAC table analysis F. Proprietary analysis Answer: AEF 48.The majority of rogue devices are placed by whom? (Choose all that apply.) A. Attackers B. Wardrivers C. Employees D. Contractors E. Visitors Answer: CDE 49. Initiation of 4-way handshake 50.What is another name for a wireless hijacking attack? A. Wi-Fi phishing B. Man-in-the-middle C. Fake AP D. Evil twin E. AirSpy Answer: D 51.What kind of remote actions can an MDM administrator send to the mobile device over the 11 / 16 https://www.dumpsinfo.com/ Internet? A. Configuration changes B. Restrictions changes C. Locking the device D. Wiping the device E. Application changes F. All of the above Answer: F 52.Andrew Garcia, the WLAN administrator, is trying to explain to his boss that the WLAN is not the reason that Andrew’s boss cannot post on Facebook. Andrew has determined that the problem does not exist at Layer 1 or Layer 2 of the OSI model. What should Andrew say to his boss? (Choose the best answer.) A. Wi-Fi only operates at Layer 1 and Layer 2 of the OSI model. The WLAN is not the problem. B. The problem is most likely a networking problem or an application problem. C. Don’t worry, boss; I will fix it. D. Why are you looking at Facebook during business hours? Answer: C 53.Given: In XYZ's small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2- Personal. What statement about the WLAN security of this company is true? A. Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the data traffic of other users. B. A successful attack against all unicast traffic on the network would require a weak passphrase dictionary attack and the capture of the latest 4-Way Handshake for each client. C. An unauthorized wireless client device cannot associate, but can eavesdrop on some data because WPA2- Personal does not encrypt multicast or broadcast traffic. D. An unauthorized WLAN user with a protocol analyzer can decode data frames of authorized users if he captures the BSSID, client MAC address, and a user's 4-Way Handshake. E. Because WPA2-Personal uses Open System authentication followed by a 4-Way Handshake, hijacking attacks are easily performed. Answer: B 54.An HT client STA is transmitting to an HT AP using modulation and coding scheme (MCS) #12 that defines 16-QAM modulation, two spatial streams, a 40-MHz bonded channel, and an 800 ns guard interval to achieve a data rate of 162 Mbps. According to the IEEE, which types of encryption should be used by the HT client STA? (Choose all that apply.) A. Static WEP B. Dynamic WEP C. TKIP/ARC4 D. CCMP/AES E. All of the above Answer: D 55.Monitoring potentially malicious wireless activity on the network is handled by _____________, whereas intrusion remediation and mitigation is handled by __________________________. 12 / 16 https://www.dumpsinfo.com/ A. WIDS, WIDS B. WIPS, WIPS C. WIDS, FIPS D. WIPS, FIPS E. WIDS, WIPS Answer: E 56.You are using a utility that takes input and generates random output. For example, you can provide the input of a known word as a secret word and then also provide another known word as salt input. When you process the input it generates a secret code which is a combination of letters and numbers with case sensitivity. For what is the described utility used? (Choose 3) A. Generating passwords for WLAN infrastructure equipment logins B. Generating PMKs that can be imported into 802.11 RSN-compatible devices C. Generating secret keys for RADIUS servers and WLAN infrastructure devices D. Generating passphrases for WLAN systems secured with WPA2-Personal E. Generating dynamic session keys used for IPSec VPNs Answer: ACD 57.What are some of the security capabilities found in an enterprise WLAN router that is typically deployed in remote branch locations? (Choose all that apply.) A. Integrated WIPS server B. Integrated VPN server C. Integrated NAC server D. Integrated firewall E. Integrated VPN client Answer: DE 58.What are some of the advantages of using SAE authentication over PSK authentication? (Choose all that apply.) A. Protects against brute-force dictionary attacks. B. Protects against forgery and replay attacks. C. Protects against rogue APs and clients. D. PMKs cannot be compromised or regenerated. E. PMKs are no longer needed. Answer: ABD 59.You have been working with the network staff to expand the wireless coverage within your customer’s building. Halfway through the project you are asked by a member of management to stop and leave the premises. Which step in WLAN deployment did you most likely not take prior to beginning the WLAN expansion? A. Obtaining a Scope of Work (SOW) agreement B. Signing a mutual nondisclosure agreement (NDA) C. Reviewing written corporate security policies D. Requesting that a facility escort be present Answer: C 13 / 16 https://www.dumpsinfo.com/ 60.What are the keys that make up a pairwise transient key? (Choose all that apply.) A. STK B. KEK C. SMK D. TK E. KCK Answer: BDE 61.What planes of operation reside in the access points of a distributed WLAN architecture? (Choose all that apply.) A. Radio plane B. Data plane C. Network plane D. Control plane E. Management plane Answer: BC 62.Given: You have a Windows laptop computer with an integrated, dual-band, Wi-Fi compliant adapter. Your laptop computer has protocol analyzer software installed that is capable of capturing and decoding 802.11ac data. What statement best describes the likely ability to capture 802.11ac frames for security testing purposes? A. All integrated 802.11ac adapters will work with most protocol analyzers for frame capture, including the Radio Tap Header. B. Integrated 802.11ac adapters are not typically compatible with protocol analyzers in Windows laptops. It is often best to use a USB adapter or carefully select a laptop with an integrated adapter that will work. C. Laptops cannot be used to capture 802.11ac frames because they do not support MUCWSP- MIMO. D. Only Wireshark can be used to capture 802.11ac frames as no other protocol analyzer has implemented the proper frame decodes.E. The only method available to capture 802.11ac frames is to perform a remote capture with a compatible access point. Answer: B 63.In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked state? A. After EAP authentication is successful B. After Open System authentication C. After the 4-Way Handshake D. After any Group Handshake Answer: A 64.What is the chronological order in which the following security standards and certifications were defined? 65.What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)? 14 / 16 https://www.dumpsinfo.com/ A. MAC Spoofing B. Eavesdropping C. Hot-spotter D. Soft AP E. Deauthentication flood F. EAP flood Answer: B 66. WPA A. 3, 5, 2, 4, 1 B. 3, 2, 5, 4, 1 C. 3, 5, 2, 1, 4 D. 1, 3, 2, 5, 4 E. 1, 3, 5, 4, 2 Answer: A 67.The network administrator of the Holy Grail Corporation calls up the support hotline for his WLAN vendor and informs the support personnel that the WLAN bridge link is no longer working. The support personnel ask the customer a series of questions so that they can isolate and identify the cause of a potential problem. What are some common Troubleshooting 101 questions? (Choose all that apply.) A. When is the problem happening? B. Where is the problem happening? C. Does the problem affect one client or numerous clients? D. What is the airspeed velocity of an unladen swallow? Answer: ABC 68.Which of these terms best describes the capability of a RADIUS server to forward the RADIUS requests across the Internet between different ISPs or different companies? A. Machine authentication B. LDAP authentication C. User authentication D. Realm-based authentication E. Domain authentication Answer: D 69.What WLAN client device behavior is exploited by an attacker during a hijacking attack? A. When the RF signal between a client and an access point is disrupted for more than a few seconds, the client device will attempt to associate to an access point with better signal quality. B. When the RF signal between a client and an access point is lost, the client will not seek to reassociate with another access point until the 120 second hold down timer has expired. C. After the initial association and 4-way handshake, client stations and access points do not need to perform another 4-way handshake, even if connectivity is lost. D. As specified by the Wi-Fi Alliance, clients using Open System authentication must allow direct client-to- client connections, even in an infrastructure BSS. E. Client drivers scan for and connect to access points in the 2.4 GHz band before scanning the 5 GHz band. Answer: A 15 / 16 https://www.dumpsinfo.com/ 70.Which of the following protocols is used for authentication in an 802.1X framework? A. IPSec B. TKIP C. EAP D. L2TP Answer: C 71.Which type of triangulation method takes into account the speed of travel? A. RF triangulation B. RF calibration C. RF positioning D. RF fingerprinting E. TDoA Answer: E 72.Which hash algorithms can be used in the IKE authentication process? (Choose two.) A. Diffie-Hellman B. MS-CHAPv2 C. MD5 D. ISAKMP E. SHA-1 Answer: CE Powered by TCPDF (www.tcpdf.org) 16 / 16 https://www.dumpsinfo.com/ http://www.tcpdf.org