- All Exams Instant Download
What is another name for PSK authentication?
The IEEE 802.11-2012 standard requires an authentication and key management protocol (AKMP) that can be either a preshared (PSK) or an EAP protocol used during 802.1X/EAP authentication. What is another name for PSK authentication? (Choose all that apply.)A . Wi-Fi Protected SetupB . WPA/WPA2-PersonalC . WPA/WPA2-PSKD . WPA/WPA2-Preshared KeyE ....
What can happen when an intruder compromises the preshared key used during WPA/WPA2-Personal authentication? (Choose all that apply.)
What can happen when an intruder compromises the preshared key used during WPA/WPA2-Personal authentication? (Choose all that apply.)A . DecryptionB . EavesdroppingC . SpoofingD . Encryption crackingE . Access to network resourcesView AnswerAnswer: AE
What kind of remote actions can an MDM administrator send to the mobile device over the Internet?
What kind of remote actions can an MDM administrator send to the mobile device over the Internet?A . Configuration changesB . Restrictions changesC . Locking the deviceD . Wiping the deviceE . Application changesF . All of the aboveView AnswerAnswer: F
Which of the following can be used with a wireless network to segment or restrict access to parts of the network? (Choose all that apply.)
Which of the following can be used with a wireless network to segment or restrict access to parts of the network? (Choose all that apply.)A . VLANsB . WPA-2C . FirewallD . 802.11iE . RBACView AnswerAnswer: ACE
According to the IEEE, which types of encryption should be used by the HT client STA?
An HT client STA is transmitting to an HT AP using modulation and coding scheme (MCS) #12 that defines 16-QAM modulation, two spatial streams, a 40-MHz bonded channel, and an 800 ns guard interval to achieve a data rate of 162 Mbps. According to the IEEE, which types of encryption...
The Wi-Fi Alliance is responsible for which of the following certification programs? (Choose all that apply.)
The Wi-Fi Alliance is responsible for which of the following certification programs? (Choose all that apply.)A . WPA2B . WEPC . 802.11-2012D . WMME . PSKView AnswerAnswer: AD
With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
Given: In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation's wireless network. Demonstrating the vulnerabilities of using WEP, the consultant uses a laptop running a software AP in an attempt to hijack the authorized user's connections. XYZ's legacy network is using 802.11n APs with...
Which of these RADIUS deployment models guarantees secure WLAN connectivity even if a remote WAN link goes down?
Bob has been tasked with designing an 802.1X/EAP solution for the corporate WLAN. The company headquarters and datacenter reside in Denver. Employees need secure WLAN access at 15 remote offices in other cities. Which of these RADIUS deployment models guarantees secure WLAN connectivity even if a remote WAN link goes...
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)A . Sensor with 2.4 GHz and 5 GHz radioB . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHzC . Sensor with three radios: 2.4 GHz, 5 GHz,...
When two client stations are already associated to an AP, which handshake is used to create a different unicast key that the two client stations can use for a private conversation while they remain associated to the AP?
When two client stations are already associated to an AP, which handshake is used to create a different unicast key that the two client stations can use for a private conversation while they remain associated to the AP?A . Mesh Group Key HandshakeB . Group Key HandshakeC . 4-Way HandshakeD...