What types of wireless attacks are protected by 802.11w?

ABC Company uses the wireless network for highly sensitive network traffic. For that reason, they intend to protect their network in all possible ways. They are continually researching new network threats and new preventative measures. They are interested in the security benefits of 802.11w, but would like to know its...

August 29, 2024 No Comments READ MORE +

What is some of the proper documentation needed prior to the WLAN security audit?

What is some of the proper documentation needed prior to the WLAN security audit?A . Statement of workB . Liability waiverC . Nondisclosure agreementD . All of the aboveView AnswerAnswer: D

August 29, 2024 No Comments READ MORE +

What statement accurately describes the functionality of the IEEE 802.1X standard?

What statement accurately describes the functionality of the IEEE 802.1X standard?A . Port-based access control with EAP encapsulation over the LAN (EAPoL)B . Port-based access control with dynamic encryption key management and distributionC . Port-based access control with support for authenticated-user VLANs onlyD . Port-based access control with mandatory support...

August 29, 2024 No Comments READ MORE +

3DES has effective key sizes of how many bits? (Choose all that apply.)

3DES has effective key sizes of how many bits? (Choose all that apply.)A . 56B . 64C . 112D . 128E . 168F . 192View AnswerAnswer: ACE

August 28, 2024 No Comments READ MORE +

Which portion of a well-written security policy is most likely missing from your company’s wireless security policy that caused this problem?

After consulting your written security policy, to meet the new demands of an industry standard with which your organization must be compliant, an administrator logs into your WLAN controller and changes the authentication and encryption configurations on all your APs. The help desk becomes overwhelmed with calls from angry users...

August 28, 2024 No Comments READ MORE +

What inputs are used by passphrase-PSK mapping to create a final 256-bit PSK during 802.11 PSK authentication? (Choose all that apply.)

What inputs are used by passphrase-PSK mapping to create a final 256-bit PSK during 802.11 PSK authentication? (Choose all that apply.)A . BSSIDB . SNonceC . SSIDD . Client MAC addressE . AP MAC addressF . PassphraseG . ANonceView AnswerAnswer: CF

August 28, 2024 No Comments READ MORE +

When an attacker passively captures and examines wireless frames from a victim’s network, what type of attack is taking place?

When an attacker passively captures and examines wireless frames from a victim’s network, what type of attack is taking place?A . InjectionB . Data destructionC . Frame manipulationD . Man in the middleE . EavesdroppingView AnswerAnswer: E

August 28, 2024 No Comments READ MORE +

Which technologies use the RC4 or ARC4 cipher? (Choose all that apply.)

Which technologies use the RC4 or ARC4 cipher? (Choose all that apply.)A . Static WEPB . Dynamic WEPC . PPTPD . L2TPE . MPPEView AnswerAnswer: ABE

August 27, 2024 No Comments READ MORE +

Within an 802.1X infrastructure framework, what is the name of the device that communicates directly with a RADIUS server using the RADIUS protocol? (Choose all that apply.)

Within an 802.1X infrastructure framework, what is the name of the device that communicates directly with a RADIUS server using the RADIUS protocol? (Choose all that apply.)A . AuthenticatorB . RADIUS portsC . Network access serverD . LDAP integrationE . RADIUS clientF . SupplicantView AnswerAnswer: ACE

August 27, 2024 No Comments READ MORE +

What are the possible causes of this problem?

Bob the WLAN administrator is troubleshooting an IPsec VPN problem that has been deployed as the security solution over a point-to-point 802.11 wireless bridge link between two buildings. Bob cannot get the VPN tunnel to establish and notices that there is a certificate error during the IKE Phase 1 exchange....

August 26, 2024 No Comments READ MORE +