Which of the following should the technician check NEXT?
Several computers are having network connectivity issues. Two of the computers are wired and are not having any issues. The technician verifies that none of the computers having issues have been assigned a static IP. Which of the following should the technician check NEXT?A . Check the closest AP for...
In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
Fred works primarily from home and public wireless hotspots rather than commuting to office. He frequently accesses the office network remotely from his Mac laptop using the local 802.11 WLAN. In this remote scenario, what single wireless security practice will provide the greatest security for Fred?A . Use enterprise WIPS...
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public access networks such as wireless hotspots?A . Require Port Address Translation (PAT) on each laptop.B . Require secure applications such as POP, HTTP, and SSD . Require...
What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations?
You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet. What must you do to implement these APs in a secure manner beyond the normal indoor AP implementations? (Choose the single best answer.)A . Ensure proper physical and environmental...
From a security perspective, why is this significant?
During 802.1X/LEAP authentication, the username is passed across the wireless medium in clear text. From a security perspective, why is this significant?A . The username can be looked up in a dictionary file that lists common username/password combinations.B . The username is needed for Personal Access Credential (PAC) andC ....
What statement about the WLAN security of this company is true?
In XYZ’s small business, two autonomous 802.11ac APs and 12 client devices are in use with WPA2Personal. What statement about the WLAN security of this company is true?A . Intruders may obtain the passphrase with an offline dictionary attack and gain network access, but will be unable to decrypt the...
With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with 802.11b,...
Which one of the following is not a role defined in the 802.1X authentication procedures used in 802.11 and 802.3 networks for port-based authentication?
Which one of the following is not a role defined in the 802.1X authentication procedures used in 802.11 and 802.3 networks for port-based authentication?A . AAA ServerB . Authentication ServerC . SupplicantD . AuthenticatorView AnswerAnswer: A
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?A . EAP-GTCB . PEAPC . EAP-TTLSD . LEAPE . H-REAPView AnswerAnswer: B
As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication?
ABC Corporation is evaluating the security solution for their existing WLAN. Two of their supported solutions include a PPTP VPN and 802.1X/LEAP. They have used PPTP VPNs because of their wide support in server and desktop operating systems. While both PPTP and LEAP adhere to the minimum requirements of the...