What types of wireless attacks are protected by 802.11w?
ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its...
What is some of the proper documentation needed prior to the WLAN security audit?
What is some of the proper documentation needed prior to the WLAN security audit?A . Statement of workB . Liability waiverC . Nondisclosure agreementD . All of the aboveView AnswerAnswer: D
What statement accurately describes the functionality of the IEEE 802.1X standard?
What statement accurately describes the functionality of the IEEE 802.1X standard?A . Port-based access control with EAP encapsulation over the LAN (EAPoL)B . Port-based access control with dynamic encryption key management and distributionC . Port-based access control with support for authenticated-user VLANs onlyD . Port-based access control with mandatory support...
3DES has effective key sizes of how many bits? (Choose all that apply.)
3DES has effective key sizes of how many bits? (Choose all that apply.)A . 56B . 64C . 112D . 128E . 168F . 192View AnswerAnswer: ACE
Which portion of a well-written security policy is most likely missing from your company’s wireless security policy that caused this problem?
After consulting your written security policy, to meet the new demands of an industry standard with which your organization must be compliant, an administrator logs into your WLAN controller and changes the authentication and encryption configurations on all your APs. The help desk becomes overwhelmed with calls from angry users...
What inputs are used by passphrase-PSK mapping to create a final 256-bit PSK during 802.11 PSK authentication? (Choose all that apply.)
What inputs are used by passphrase-PSK mapping to create a final 256-bit PSK during 802.11 PSK authentication? (Choose all that apply.)A . BSSIDB . SNonceC . SSIDD . Client MAC addressE . AP MAC addressF . PassphraseG . ANonceView AnswerAnswer: CF
When an attacker passively captures and examines wireless frames from a victim’s network, what type of attack is taking place?
When an attacker passively captures and examines wireless frames from a victim’s network, what type of attack is taking place?A . InjectionB . Data destructionC . Frame manipulationD . Man in the middleE . EavesdroppingView AnswerAnswer: E
Which technologies use the RC4 or ARC4 cipher? (Choose all that apply.)
Which technologies use the RC4 or ARC4 cipher? (Choose all that apply.)A . Static WEPB . Dynamic WEPC . PPTPD . L2TPE . MPPEView AnswerAnswer: ABE
Within an 802.1X infrastructure framework, what is the name of the device that communicates directly with a RADIUS server using the RADIUS protocol? (Choose all that apply.)
Within an 802.1X infrastructure framework, what is the name of the device that communicates directly with a RADIUS server using the RADIUS protocol? (Choose all that apply.)A . AuthenticatorB . RADIUS portsC . Network access serverD . LDAP integrationE . RADIUS clientF . SupplicantView AnswerAnswer: ACE
What are the possible causes of this problem?
Bob the WLAN administrator is troubleshooting an IPsec VPN problem that has been deployed as the security solution over a point-to-point 802.11 wireless bridge link between two buildings. Bob cannot get the VPN tunnel to establish and notices that there is a certificate error during the IKE Phase 1 exchange....