Which encryption types can be used to encrypt and decrypt unicast traffic with the pairwise transient key (PTK) that is generated from a 4-Way Handshake? (Choose all that apply.)
Which encryption types can be used to encrypt and decrypt unicast traffic with the pairwise transient key (PTK) that is generated from a 4-Way Handshake? (Choose all that apply.)A . Temporal Key Integrity ProtocolB . 3-DESC . Dynamic WEPD . CCMPE . Proprietary encryptionF . Static WEPView AnswerAnswer: ADE
Which organization is responsible for the creation of documents known as Requests for Comments?
Which organization is responsible for the creation of documents known as Requests for Comments?A . IEEEB . ISOC . IETFD . Wi-Fi AllianceE . RFC ConsortiumView AnswerAnswer: C
Which of the following are the security measures that are needed to maintain the security of wireless LAN?
Which of the following are the security measures that are needed to maintain the security of wireless LAN? Each correct answer represents a complete solution. Choose all that apply.A . WIDSB . FirewallsC . WLAN controllerD . WIPSView AnswerAnswer: ABD
Which of these alarms should be configured to send an automatic notification to the WIPS administrator’s phone and/or email account? (Choose all that apply.)
Which of these alarms should be configured to send an automatic notification to the WIPS administrator’s phone and/or email account? (Choose all that apply.)A . Man-in-the-middle attack detectedB . Unauthorized client detectedC . Rogue AP detectedD . Unauthorized AP detectedView AnswerAnswer: AC
Which RADIUS attribute is used to protect encapsulated EAP frames within RADIUS packets?
Which RADIUS attribute is used to protect encapsulated EAP frames within RADIUS packets?A . (11) Filter-IdB . (26) Vendor-SpecificC . (40) Acct-Status-TypeD . (79) EAP-MessageE . (80) Message-AuthenticatorView AnswerAnswer: D
What is some of the operation information that an 802.11k-2008Ccompliant client station may receive in the neighbor report from an 802.11k-2008Ccompliant access point (AP)? (Choose all that apply.)
What is some of the operation information that an 802.11k-2008Ccompliant client station may receive in the neighbor report from an 802.11k-2008Ccompliant access point (AP)? (Choose all that apply.)A . BSSID of neighbor APB . PHY types supported by neighbor APC . APSD support of neighbor APD . Channel number of...
How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?
Given: ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for each group within the company (Marketing, Sales, and Engineering). How are authenticated users assigned to groups so that they receive the correct...
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)
Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)A . Sensor with 2.4 GHz and 5 GHz radioB . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHzC . Sensor with three radios: 2.4 GHz, 5 GHz,...
Which management protocols are often used between a network management server (NMS) and remote access points for the purpose of monitoring a WLAN? (Choose all that apply.)
Which management protocols are often used between a network management server (NMS) and remote access points for the purpose of monitoring a WLAN? (Choose all that apply.)A . IPsecB . GREC . CAPWAPD . DTLSE . SNMPView AnswerAnswer: CE
When is it allowable not to include a specific external influence in your policy development?
When developing a security policy, it is important to include many influences such as internal requirements, governmental regulations, and industry standards. When is it allowable not to include a specific external influence in your policy development?A . When there is little to no chance of being audited for complianceB ....