What preventative measures are performed by a WIPS against intrusions?
What preventative measures are performed by a WIPS against intrusions?A . EAPoL Reject frame flood against a rogue APB . Evil twin attack against a rogue APC . Deauthentication attack against a classified neighbor APD . ASLEAP attack against a rogue APE . Uses SNMP to disable the switch port...
Which method of guest management can be used by a company to gather valuable personal information about guest users?
Which method of guest management can be used by a company to gather valuable personal information about guest users?A . Social loginB . Kiosk modeC . Receptionist registrationD . Self-registrationE . Employee sponsorshipView AnswerAnswer: A
Which of these terms best describes a measure of uncertainty associated with a random variable?
Which of these terms best describes a measure of uncertainty associated with a random variable?A . EntropyB . EncryptionC . EncapsulationD . EncodingView AnswerAnswer: A
What are some of the purposes of the 4-Way Handshake? (Choose all that apply.)
What are some of the purposes of the 4-Way Handshake? (Choose all that apply.)A . Transfer the GTK to the supplicant.B . Derive a PTK from the PMK.C . Transfer the GMK to the supplicant.D . Confirm cipher suites.View AnswerAnswer: ABD
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)A . SNMPv1B . HTTPSC . TelnetD . TFTPE . FTPF . SSHv2View AnswerAnswer: BF
Which of these tools are required for a proper WLAN security audit? (Choose all that apply.)
Which of these tools are required for a proper WLAN security audit? (Choose all that apply.)A . Spectrum analyzerB . WLAN protocol analyzerC . WLAN penetration testing software toolsD . Global positioning sensor (GPS)E . CamerasView AnswerAnswer: ABC
Which portion of a well-written security policy is most likely missing from your company’s wireless security policy that caused this problem?
After consulting your written security policy, to meet the new demands of an industry standard with which your organization must be compliant, an administrator logs into your WLAN controller and changes the authentication and encryption configurations on all your APs. The help desk becomes overwhelmed with calls from angry users...
Which one of the following technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with 802.11-2012 non-deprecated technologies?
You must support a TSN as you have older wireless equipment that will not support the required processing of AES encryption. Which one of the following technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with...
Which of these authentication methods are supported by RADIUS and can be used for WLAN security? (Choose all that apply.)
Which of these authentication methods are supported by RADIUS and can be used for WLAN security? (Choose all that apply.)A . Hologram authenticationB . Captive web portal authenticationC . MAC authenticationD . TSA authenticationE . 802.1X/EAP authenticationView AnswerAnswer: BCE
What 802.11 WLAN security problem is directly addressed by mutual authentication?
What 802.11 WLAN security problem is directly addressed by mutual authentication?A . Wireless hijacking attacksB . Weak password policiesC . MAC spoofingD . Disassociation attacksE . Offline dictionary attacksF . Weak Initialization VectorsView AnswerAnswer: A