- All Exams Instant Download
Wired leakage occurs under which of the following circumstances?
Wired leakage occurs under which of the following circumstances?A . When weak wireless encryption is usedB . When weak wireless authentication is usedC . When wired broadcast traffic is passed through an APD . When wired unicast traffic is passed through an APE . When the protection mode is disabled...
What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?
Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method. What solutions will require...
What are the available form factors for network management server (NMS) solutions? (Choose all that apply.)
What are the available form factors for network management server (NMS) solutions? (Choose all that apply.)A . Hardware applianceB . Virtual applianceC . Software subscription serviceD . Integrated access pointView AnswerAnswer: ABC
What are some of the reasons for Tammy’s recommendation?
Tammy, the WLAN security engineer, has recommended to management that WPA-Personal security not be deployed within the ACME Company’s WLAN. What are some of the reasons for Tammy’s recommendation? (Choose all that apply.)A . Static passphrases and PSKs are susceptible to social engineering attacks.B . WPA-Personal is susceptible to brute-force...
Which one of the following tools will you use and why?
You must locate non-compliant 802.11 devices. Which one of the following tools will you use and why?A . A spectrum analyzer, because it can show the energy footprint of a device using WPA differently from a device using WPA2.B . A spectrum analyzer, because it can decode the PHY preamble...
To calculate the capability Jeff should have on the network, which of the following can the NAC server use to initially identify and set his permission? (Choose all that apply.)
To calculate the capability Jeff should have on the network, which of the following can the NAC server use to initially identify and set his permission? (Choose all that apply.)A . PostureB . DHCP fingerprintingC . RADIUS attributesD . RADIUS CoAE . MDM profilesView AnswerAnswer: ABCE
What is another name for a wireless hijacking attack?
What is another name for a wireless hijacking attack?A . Wi-Fi phishingB . Man-in-the-middleC . Fake APD . Evil twinE . AirSpyView AnswerAnswer: D
Which Layer 2 protocol is used for authentication in an 802.1X framework?
Which Layer 2 protocol is used for authentication in an 802.1X framework?A . PAPB . MS-CHAPv2C . EAPD . CHAPE . MS-CHAPView AnswerAnswer: C
Which of the following encryption methods use symmetric algorithms? (Choose all that apply.)
Which of the following encryption methods use symmetric algorithms? (Choose all that apply.)A . WEPB . TKIPC . Public-key cryptographyD . CCMPView AnswerAnswer: ABD
Which of the following is an expanded version of this acronym?
CCMP is an acronym made up of multiple components. Which of the following is an expanded version of this acronym? (Choose all that apply)A . Counter Mode with Cipher-Block Chaining Message Authentication Code ProtocolB . Counter Message with Cipher-Block Chaining Mode Authentication Code ProtocolC . CTR with CBC-MAC ProtocolD ....