Wired leakage occurs under which of the following circumstances?

Wired leakage occurs under which of the following circumstances?A . When weak wireless encryption is usedB . When weak wireless authentication is usedC . When wired broadcast traffic is passed through an APD . When wired unicast traffic is passed through an APE . When the protection mode is disabled...

September 11, 2024No CommentsREAD MORE +

What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?

Given: The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method. What solutions will require...

September 10, 2024No CommentsREAD MORE +

What are the available form factors for network management server (NMS) solutions? (Choose all that apply.)

What are the available form factors for network management server (NMS) solutions? (Choose all that apply.)A . Hardware applianceB . Virtual applianceC . Software subscription serviceD . Integrated access pointView AnswerAnswer: ABC

September 10, 2024No CommentsREAD MORE +

What are some of the reasons for Tammy’s recommendation?

Tammy, the WLAN security engineer, has recommended to management that WPA-Personal security not be deployed within the ACME Company’s WLAN. What are some of the reasons for Tammy’s recommendation? (Choose all that apply.)A . Static passphrases and PSKs are susceptible to social engineering attacks.B . WPA-Personal is susceptible to brute-force...

September 10, 2024No CommentsREAD MORE +

Which one of the following tools will you use and why?

You must locate non-compliant 802.11 devices. Which one of the following tools will you use and why?A . A spectrum analyzer, because it can show the energy footprint of a device using WPA differently from a device using WPA2.B . A spectrum analyzer, because it can decode the PHY preamble...

September 9, 2024No CommentsREAD MORE +

To calculate the capability Jeff should have on the network, which of the following can the NAC server use to initially identify and set his permission? (Choose all that apply.)

To calculate the capability Jeff should have on the network, which of the following can the NAC server use to initially identify and set his permission? (Choose all that apply.)A . PostureB . DHCP fingerprintingC . RADIUS attributesD . RADIUS CoAE . MDM profilesView AnswerAnswer: ABCE

September 9, 2024No CommentsREAD MORE +

What is another name for a wireless hijacking attack?

What is another name for a wireless hijacking attack?A . Wi-Fi phishingB . Man-in-the-middleC . Fake APD . Evil twinE . AirSpyView AnswerAnswer: D

September 9, 2024No CommentsREAD MORE +

Which Layer 2 protocol is used for authentication in an 802.1X framework?

Which Layer 2 protocol is used for authentication in an 802.1X framework?A . PAPB . MS-CHAPv2C . EAPD . CHAPE . MS-CHAPView AnswerAnswer: C

September 9, 2024No CommentsREAD MORE +

Which of the following encryption methods use symmetric algorithms? (Choose all that apply.)

Which of the following encryption methods use symmetric algorithms? (Choose all that apply.)A . WEPB . TKIPC . Public-key cryptographyD . CCMPView AnswerAnswer: ABD

September 9, 2024No CommentsREAD MORE +

Which of the following is an expanded version of this acronym?

CCMP is an acronym made up of multiple components. Which of the following is an expanded version of this acronym? (Choose all that apply)A . Counter Mode with Cipher-Block Chaining Message Authentication Code ProtocolB . Counter Message with Cipher-Block Chaining Mode Authentication Code ProtocolC . CTR with CBC-MAC ProtocolD ....

September 8, 2024No CommentsREAD MORE +