- All Exams Instant Download
What client stations possess the keys that are necessary to decrypt the multicast data packets carrying these videos?
SSID: ABCVoice VLAN 60 Security: WPA2-Personal 2 current clients Two client STAs are connected to ABCData and can access a media server that requires authentication at the Application Layer and is used to stream multicast video streams to the clients. What client stations possess the keys that are necessary to...
A WIDS/WIPS consists of which of the following components? (Choose two.)
A WIDS/WIPS consists of which of the following components? (Choose two.)A . WIDS/WIPS serverB . Midspan injectorC . SensorsD . MDM serverE . SNMP serverView AnswerAnswer: AC
The science of concealing plaintext and then revealing it is known as ___________, and the science of decrypting the ciphertext without knowledge of the key or cipher is known as ____________.
The science of concealing plaintext and then revealing it is known as ___________, and the science of decrypting the ciphertext without knowledge of the key or cipher is known as ____________.A . encryption, decryptionB . cryptanalysis, cryptologyC . cryptology, cryptanalysisD . cryptography, cryptanalysisE . cryptography, steganographyView AnswerAnswer: D
What type of WLAN security is depicted by this graphic?
What type of WLAN security is depicted by this graphic? A . RSNB . TSNC . VPND . WPSE . WMMView AnswerAnswer: B
What type of WLAN attacks might be detected by a distributed WIDS/WIPS solution using a signature analysis software engine? (Choose all that apply.)
What type of WLAN attacks might be detected by a distributed WIDS/WIPS solution using a signature analysis software engine? (Choose all that apply.)A . PS-Poll floodB . Deauthentication attackC . Protocol fuzzingD . Virtual carrier attackE . CTS flood attackF . Zero day attackView AnswerAnswer: ABDE
What are some of the benefits of using a WIPS to achieve policy compliance that make it more desirable than using periodic handheld or laptop-based scanning solutions?
Although your organization’s written policy and many external policy influences may require only periodic scanning for rogue devices, you are trying to make a case for deploying a WIPS. What are some of the benefits of using a WIPS to achieve policy compliance that make it more desirable than using...
Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)
Wireless Intrusion Prevention Systems (WIPS) provide what network security services? (Choose 2)A . Configuration distribution for autonomous APsB . Wireless vulnerability assessmentC . Application-layer traffic inspectionD . Analysis and reporting of AP CPU utilizationE . Policy enforcement and compliance managementView AnswerAnswer: BE
These qualifications for interoperability are usually based on key components and functions that are defined in the IEEE 802.11-2012 standard and various 802.11 amendments.
These qualifications for interoperability are usually based on key components and functions that are defined in the IEEE 802.11-2012 standard and various 802.11 amendments.A . Request for CommentsB . Wi-Fi AllianceC . Federal Information Processing StandardsD . Internet Engineering Task ForceE . Wi-Fi CERTIFIEDView AnswerAnswer: E
Which of the following could the client be using?
Laura is attempting to diagnose a WLAN by using a packet analyzer to capture the exchange of frames and packets between a wireless client and the AP. In the process of analyzing the packets, she sees two 802.11 authentication frames, two 802.11 association frames, and DHCP requests and responses, and...
As defined by the 802.11-2012 standard, which of these authentication methods can be used by a client station to establish a pairwise master key security association (PMKSA)? (Choose all that apply.)
As defined by the 802.11-2012 standard, which of these authentication methods can be used by a client station to establish a pairwise master key security association (PMKSA)? (Choose all that apply.)A . PSK authenticationB . WEP authenticationC . 802.1X/EAP authenticationD . Open authenticationE . SAE authenticationView AnswerAnswer: ACE