What type of WLAN attacks might be detected by a distributed WIDS/WIPS solution using a behavioral analysis software engine? (Choose all that apply.)

What type of WLAN attacks might be detected by a distributed WIDS/WIPS solution using a behavioral analysis software engine? (Choose all that apply.)A . EAP flood attackB . Deauthentication attackC . Protocol fuzzingD . Fake AP attackE . CTS flood attackF . Zero day attackView AnswerAnswer: CF

September 5, 2024No CommentsREAD MORE +

To ensure the wireless network is as secure as possible from common attacks, what security measure can you implement given only the hardware referenced?

You are configuring seven APs to prevent common security attacks. The APs are to be installed in a small business and to reduce costs, the company decided to install all consumer grade wireless routers. The wireless routers will connect to a switch, which connects directly to the Internet connection providing...

September 5, 2024No CommentsREAD MORE +

Which of these security methods is being considered by the Wi-Fi Alliance as a replacement for PSK authentication?

Which of these security methods is being considered by the Wi-Fi Alliance as a replacement for PSK authentication?A . Per-user/per-device PSKB . Wi-Fi Protected Setup (WPS)C . Simultaneous Authentication of Equals (SAE)D . EAP-PSKE . WPA2 PersonalView AnswerAnswer: C

September 4, 2024No CommentsREAD MORE +

After viewing the frame capture in the graphic shown here, identify which type of encryption method is being used.

After viewing the frame capture in the graphic shown here, identify which type of encryption method is being used. A . TKIPB . CCMPC . xSecD . FortressE . WEPF . AESView AnswerAnswer: E

September 4, 2024No CommentsREAD MORE +

What disadvantage does EAP-TLS have when compared with PEAPv0 EAP/MSCHAPv2 as an 802.11 WLAN security solution?

What disadvantage does EAP-TLS have when compared with PEAPv0 EAP/MSCHAPv2 as an 802.11 WLAN security solution?A . Fast/secure roaming in an 802.11 RSN is significantly longer when EAP-TLS is in use.B . EAP-TLS does not protect the client's username and password inside an encrypted tunnel.C . EAP-TLS cannot establish a...

September 4, 2024No CommentsREAD MORE +

What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?

What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?A . EAP-TTLS sends encrypted supplicant credentials to the authentication server, but EAP-TLS uses unencrypted user credentials.B . EAP-TTLS supports client certificates, but EAP-TLS does not.C . EAP-TTLS does not require an authentication...

September 4, 2024No CommentsREAD MORE +

What are of some of the common security capabilities often integrated within in access points deployed in a distributed WLAN architecture?

What are of some of the common security capabilities often integrated within in access points deployed in a distributed WLAN architecture?A . Captive web portalB . FirewallC . Integrated RADIUSD . WIPSE . All of the aboveView AnswerAnswer: E

September 4, 2024No CommentsREAD MORE +

In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?

In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?A . In home networks in which file and printer sharing is enabledB . At public hot-spots in which many clients use diverse applicationsC . In corporate Voice over Wi-Fi networks with push-to-talk multicast capabilitiesD . In university...

September 4, 2024No CommentsREAD MORE +

When using the 802.1X/EAP framework for authentication in 802.11 WLANs, why is the 802.1X Controlled Port still blocked after the 802.1X/EAP framework has completed successfully?

When using the 802.1X/EAP framework for authentication in 802.11 WLANs, why is the 802.1X Controlled Port still blocked after the 802.1X/EAP framework has completed successfully?A . The 802.1X Controlled Port is always blocked, but the Uncontrolled Port opens after the EAP authentication process completes.B . The 802.1X Controlled Port remains...

September 4, 2024No CommentsREAD MORE +

What is the difference between the inner and outer identity?

What is the difference between the inner and outer identity?A . Only the authentication server provides its credentials in the outer identity response.B . The inner identity is only for authentication server credentials provided to the supplicant.C . The inner identity must correspond to the outer identity for realm-based authentications.D...

September 3, 2024No CommentsREAD MORE +