What three cipher suites are specified by the IEEE 802.11-2012 standard? (Choose 3)
What three cipher suites are specified by the IEEE 802.11-2012 standard? (Choose 3)A . Counter Mode with CBC-MAC ProtocolB . Wi-Fi Protected Access v1 and v2C . Internet Protocol SecurityD . Extensible Authentication ProtocolE . GCM with Galois Message Authentication Code (GMAC) ProtocolF . Wired Equivalent PrivacyG . Temporal Key...
Which two 802.11 topologies require the use of an AP?
Which two 802.11 topologies require the use of an AP?A . IBSSB . BSSC . PBSSD . ESSView AnswerAnswer: BD
When using a hotspot, you should do which of the following to ensure security back to your corporate network?
When using a hotspot, you should do which of the following to ensure security back to your corporate network?A . Enable WEP.B . Enable 802.1X/EAP.C . Use an IPsec VPN.D . Security cannot be provided because you do not control the access point.View AnswerAnswer: C
After hearing this information, what immediate concerns do you note?
ABC Company is planning to install a new 802.11ac WLAN, but wants to upgrade its wired infrastructure first to provide the best user experience possible. ABC Company has hired you to perform the RF site survey. During the interview with the network manager, you are told that the new Ethernet...
When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action that must be performed?
You were previously onsite at XYZ's facility to conduct a pre-deployment RF site survey. The WLAN has been deployed according to your recommendations and you are onsite again to perform, a post-deployment validation survey. When performing this type of post-deployment RF site survey voice over Wi-Fi, what is an action...
What actions should he take after the WIPS detects the rogue AP?
Scott is an administrator at the Williams Lumber Company, and his WIPS has detected a rogue access point. What actions should he take after the WIPS detects the rogue AP? (Choose the best two answers.)A . Enable the layer 2 rogue containment feature that his WIPS provides.B . Unplug the...
What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication?
What is required when operating 802.11ax APS in the 6 GHz band using passphrase-based authentication?A . VHT PHYB . HT PHYC . SAED . CCMPView AnswerAnswer: C
What mechanism can be used if the guest VLAN is not supported at the edge of the network and only resides in A DMZ?
What mechanism can be used if the guest VLAN is not supported at the edge of the network and only resides in A DMZ?A . GREB . VPNC . STPD . RTSPE . IGMPView AnswerAnswer: A
What type of interference is caused by overlapping coverage cells with overlapping frequencies?
What type of interference is caused by overlapping coverage cells with overlapping frequencies?A . Intersymbol interferenceB . Adjacent channel interferenceC . All-band interferenceD . Narrowband interferenceE . Co-channel interferenceView AnswerAnswer: B
Which 802.11 amendments provide for throughput of 1 Gbps or higher? (Choose all that apply.)
Which 802.11 amendments provide for throughput of 1 Gbps or higher? (Choose all that apply.)A . 802.11aaB . 802.11abC . 802.11acD . 802.11adE . 802.11aeF . 802.11afView AnswerAnswer: CD