- All Exams Instant Download
What encryption methods are defined by the IEEE 802.11-2012 standard? (Choose all that apply.)
What encryption methods are defined by the IEEE 802.11-2012 standard? (Choose all that apply.)A . 3DESB . WPA-2C . SSLD . TKIPE . CCMPF . WEPView AnswerAnswer: DEF
What is the recommended ratio of WIPS sensors providing security monitoring to access points that are providing access for WLAN clients?
What is the recommended ratio of WIPS sensors providing security monitoring to access points that are providing access for WLAN clients?A . 1:2B . 1:3C . 1:4D . 1:5E . Depends on the customer’s needsView AnswerAnswer: E
Which of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?
Which of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?A . It does not support a RADIUS server.B . It is not a valid EAP type.C . It does not support mutual authentication.D . It does not support the outer identity.View AnswerAnswer: C
What are some of the recommendations that might be made to a customer after a successful WLAN security audit? (Choose all that apply.)
What are some of the recommendations that might be made to a customer after a successful WLAN security audit? (Choose all that apply.)A . Physical securityB . Employee trainingC . Dynamic RF configurationD . Monitoring capabilitiesE . AP and client power settingsView AnswerAnswer: ABD
What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?
What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?A . Audit Layer 1B . Audit Layer 2C . Audit the wired infrastructureD . Audit the WIPSView AnswerAnswer: D
Which RADIUS packets can be sent from a RADIUS server to an access point when 802.1X/EAP is the deployed WLAN security solution? (Choose all that apply.)
Which RADIUS packets can be sent from a RADIUS server to an access point when 802.1X/EAP is the deployed WLAN security solution? (Choose all that apply.)A . RADIUS Access-RequestB . RADIUS Access-ChallengeC . RADIUS Access-AcceptD . RADIUS Access-RejectView AnswerAnswer: BCD
What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?
What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?A . AKM Suite ListB . Group Cipher SuiteC . RSN CapabilitiesD . Pairwise Cipher Suite ListView AnswerAnswer: A
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)A . Sensor with 2.4 GHz and 5 GHz radioB . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHzC . Sensor with three radios: 2.4 GHz, 5 GHz,...
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)A . Sensor with 2.4 GHz and 5 GHz radioB . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHzC . Sensor with three radios: 2.4 GHz, 5 GHz,...
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?
What software and hardware tools are used in the process performed to hijack a wireless station from the authorized wireless network onto an unauthorized wireless network?A . A low-gain patch antenna and terminal emulation softwareB . MAC spoofing software and MAC DoS softwareC . RF jamming device and a wireless...