What encryption methods are defined by the IEEE 802.11-2012 standard? (Choose all that apply.)

What encryption methods are defined by the IEEE 802.11-2012 standard? (Choose all that apply.)A . 3DESB . WPA-2C . SSLD . TKIPE . CCMPF . WEPView AnswerAnswer: DEF

September 2, 2024No CommentsREAD MORE +

What is the recommended ratio of WIPS sensors providing security monitoring to access points that are providing access for WLAN clients?

What is the recommended ratio of WIPS sensors providing security monitoring to access points that are providing access for WLAN clients?A . 1:2B . 1:3C . 1:4D . 1:5E . Depends on the customer’s needsView AnswerAnswer: E

September 2, 2024No CommentsREAD MORE +

Which of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?

Which of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?A . It does not support a RADIUS server.B . It is not a valid EAP type.C . It does not support mutual authentication.D . It does not support the outer identity.View AnswerAnswer: C

September 2, 2024No CommentsREAD MORE +

What are some of the recommendations that might be made to a customer after a successful WLAN security audit? (Choose all that apply.)

What are some of the recommendations that might be made to a customer after a successful WLAN security audit? (Choose all that apply.)A . Physical securityB . Employee trainingC . Dynamic RF configurationD . Monitoring capabilitiesE . AP and client power settingsView AnswerAnswer: ABD

September 2, 2024No CommentsREAD MORE +

What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?

What would be the intended purpose of simulating Layer 2 deauthentication attacks as part of a WLAN audit?A . Audit Layer 1B . Audit Layer 2C . Audit the wired infrastructureD . Audit the WIPSView AnswerAnswer: D

September 2, 2024No CommentsREAD MORE +

Which RADIUS packets can be sent from a RADIUS server to an access point when 802.1X/EAP is the deployed WLAN security solution? (Choose all that apply.)

Which RADIUS packets can be sent from a RADIUS server to an access point when 802.1X/EAP is the deployed WLAN security solution? (Choose all that apply.)A . RADIUS Access-RequestB . RADIUS Access-ChallengeC . RADIUS Access-AcceptD . RADIUS Access-RejectView AnswerAnswer: BCD

September 1, 2024No CommentsREAD MORE +

What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?

What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?A . AKM Suite ListB . Group Cipher SuiteC . RSN CapabilitiesD . Pairwise Cipher Suite ListView AnswerAnswer: A

September 1, 2024No CommentsREAD MORE +

Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)

Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)A . Sensor with 2.4 GHz and 5 GHz radioB . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHzC . Sensor with three radios: 2.4 GHz, 5 GHz,...

September 1, 2024No CommentsREAD MORE +

Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)

Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)A . Sensor with 2.4 GHz and 5 GHz radioB . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHzC . Sensor with three radios: 2.4 GHz, 5 GHz,...

September 1, 2024No CommentsREAD MORE +

What software and hardware tools are used in the process performed to hijack a wireless  station from the authorized wireless network onto an unauthorized wireless network?

What software and hardware tools are used in the process performed to hijack a wireless  station from the authorized wireless network onto an unauthorized wireless network?A . A low-gain patch antenna and terminal emulation softwareB . MAC spoofing software and MAC DoS softwareC . RF jamming device and a wireless...

September 1, 2024No CommentsREAD MORE +