Which encryption types can be used to encrypt and decrypt unicast traffic with the pairwise transient key (PTK) that is generated from a 4-Way Handshake? (Choose all that apply.)

Which encryption types can be used to encrypt and decrypt unicast traffic with the pairwise transient key (PTK) that is generated from a 4-Way Handshake? (Choose all that apply.)A . Temporal Key Integrity ProtocolB . 3-DESC . Dynamic WEPD . CCMPE . Proprietary encryptionF . Static WEPView AnswerAnswer: ADE

September 1, 2024 No Comments READ MORE +

Which organization is responsible for the creation of documents known as Requests for Comments?

Which organization is responsible for the creation of documents known as Requests for Comments?A . IEEEB . ISOC . IETFD . Wi-Fi AllianceE . RFC ConsortiumView AnswerAnswer: C

September 1, 2024 No Comments READ MORE +

Which of the following are the security measures that are needed to maintain the security of wireless LAN?

Which of the following are the security measures that are needed to maintain the security of wireless LAN? Each correct answer represents a complete solution. Choose all that apply.A . WIDSB . FirewallsC . WLAN controllerD . WIPSView AnswerAnswer: ABD

August 31, 2024 No Comments READ MORE +

Which of these alarms should be configured to send an automatic notification to the WIPS administrator’s phone and/or email account? (Choose all that apply.)

Which of these alarms should be configured to send an automatic notification to the WIPS administrator’s phone and/or email account? (Choose all that apply.)A . Man-in-the-middle attack detectedB . Unauthorized client detectedC . Rogue AP detectedD . Unauthorized AP detectedView AnswerAnswer: AC

August 31, 2024 No Comments READ MORE +

Which RADIUS attribute is used to protect encapsulated EAP frames within RADIUS packets?

Which RADIUS attribute is used to protect encapsulated EAP frames within RADIUS packets?A . (11) Filter-IdB . (26) Vendor-SpecificC . (40) Acct-Status-TypeD . (79) EAP-MessageE . (80) Message-AuthenticatorView AnswerAnswer: D

August 31, 2024 No Comments READ MORE +

What is some of the operation information that an 802.11k-2008Ccompliant client station may receive in the neighbor report from an 802.11k-2008Ccompliant access point (AP)? (Choose all that apply.)

What is some of the operation information that an 802.11k-2008Ccompliant client station may receive in the neighbor report from an 802.11k-2008Ccompliant access point (AP)? (Choose all that apply.)A . BSSID of neighbor APB . PHY types supported by neighbor APC . APSD support of neighbor APD . Channel number of...

August 31, 2024 No Comments READ MORE +

How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?

Given: ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for each group within the company (Marketing, Sales, and Engineering). How are authenticated users assigned to groups so that they receive the correct...

August 30, 2024 No Comments READ MORE +

Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)

Which of these radio form factors are used in 802.11 WIDS/WIPS sensors? (Choose all that apply.)A . Sensor with 2.4 GHz and 5 GHz radioB . Sensor with 5 GHz radio and software-defined radio (SDR) for both 2.4 and 5 GHzC . Sensor with three radios: 2.4 GHz, 5 GHz,...

August 30, 2024 No Comments READ MORE +

Which management protocols are often used between a network management server (NMS) and remote access points for the purpose of monitoring a WLAN? (Choose all that apply.)

Which management protocols are often used between a network management server (NMS) and remote access points for the purpose of monitoring a WLAN? (Choose all that apply.)A . IPsecB . GREC . CAPWAPD . DTLSE . SNMPView AnswerAnswer: CE

August 30, 2024 No Comments READ MORE +

When is it allowable not to include a specific external influence in your policy development?

When developing a security policy, it is important to include many influences such as internal requirements, governmental regulations, and industry standards. When is it allowable not to include a specific external influence in your policy development?A . When there is little to no chance of being audited for complianceB ....

August 29, 2024 No Comments READ MORE +