- All Exams Instant Download
What must occur in order for dynamic TKIP/ARC4 or CCMP/AES encryption keys to be generated? (Choose all that apply.)
What must occur in order for dynamic TKIP/ARC4 or CCMP/AES encryption keys to be generated? (Choose all that apply.)A . Shared Key authentication and 4-Way HandshakeB . 802.1X/EAP authentication and 4-Way HandshakeC . Open System authentication and 4-Way HandshakeD . PSK authentication and 4-Way HandshakeView AnswerAnswer: BD
In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked state?
In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked state?A . After EAP authentication is successfulB . After Open System authenticationC . After the 4-Way HandshakeD . After any Group HandshakeView AnswerAnswer: A
How does a RADIUS server communicate with an authenticator? (Choose all that apply.)
How does a RADIUS server communicate with an authenticator? (Choose all that apply.)A . UDP ports 1812 and 1813B . TCP ports 1645 and 1646C . Encrypted TLS tunnelD . Encrypted IPsec tunnelE . RADIUS IP packetsF . EAPOL framesView AnswerAnswer: AE
What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)
What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)A . The WLAN system may be open to RF Denial-of-Service attacksB . WIPS may not classify authorized, rogue, and neighbor APs accuratelyC . Authentication cracking of 64-bit Hex WPA-Personal...
What should you use to answer this question for your customer?
As an auditor you have been asked to determine if the WLAN access points and client devices have been configured with the proper encryption. What should you use to answer this question for your customer? (Choose all that apply.)A . Written corporate security policyB . WLAN protocol analyzerC . Aircrack-ngD...
Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.)
Which of these attacks are wireless users susceptible to at a public-access hotspot? (Choose all that apply.)A . Wi-Fi phishingB . Happy AP attackC . Peer-to-peer attackD . Malicious eavesdroppingE . 802.11 reverse ARP attackF . Man-in-the-middleG . Wireless hijackingView AnswerAnswer: ACDFG
What type of files are used by the MDM profiles for Apple Mac OS and iOS devices? (Choose all that apply.)
What type of files are used by the MDM profiles for Apple Mac OS and iOS devices? (Choose all that apply.)A . HTTPB . XMLC . JAVAD . PHPE . PythonView AnswerAnswer: B
Which of these types of EAP require a server-side certificate to create an encrypted TLS tunnel?
Which of these types of EAP require a server-side certificate to create an encrypted TLS tunnel?A . EAP-TTLSB . EAP-PEAPv0 (EAP-MSCHAPv2)C . EAP-PEAPv0 (EAP-TLS)D . EAP-FASTE . EAP-PEAPv1 (EAP-GTC)F . EAP-LEAPView AnswerAnswer: ABCE
Based on the settings on Bob’s access point, what type of WLAN security exits within the coverage area of the AP?
168.80.5/24 User VLANS: VLAN 201 VLAN 202 VLAN 203 SSIDs: SSID-1: (employee) security: (802.1X/EAP/CCMP) - VLAN 201 - BSSID (00:08:12:43:0F:30) SSID-2 (voice) security: (PSK/TKIP and WEP) - VLAN 202 - BSSID (00:08:12:43:0F:31) SSID-3: (guest) security: (WEP) - VLAN 203 - BSSID (00:08:12:43:0F:32) Based on the settings on Bob’s access point,...
What are some of the advantages of using SAE authentication over PSK authentication? (Choose all that apply.)
What are some of the advantages of using SAE authentication over PSK authentication? (Choose all that apply.)A . Protects against brute-force dictionary attacks.B . Protects against forgery and replay attacks.C . Protects against rogue APs and clients.D . PMKs cannot be compromised or regenerated.E . PMKs are no longer needed.View...