- All Exams Instant Download
How many SSIDs are configured with cloaking enabled?
This graphic shows a WLAN discovery tool screen capture. How many SSIDs are configured with cloaking enabled? (Choose all that apply.)A . NoneB . At least tenC . OneD . TenE . Exact number cannot be determinedView AnswerAnswer: BE
What is the main purpose of using a WLAN protocol analyzer during the Layer 2 analysis of a WLAN security audit? (Choose all that apply.)
What is the main purpose of using a WLAN protocol analyzer during the Layer 2 analysis of a WLAN security audit? (Choose all that apply.)A . Identifying unauthorized devicesB . Auditing the wired infrastructureC . Performing penetration testingD . Validating security compliance of authorized devicesE . Auditing the WIPSView AnswerAnswer:...
802.11 pre-RSNA security defines which wireless security solution?
802.11 pre-RSNA security defines which wireless security solution?A . Dynamic WEPB . 802.1X/EAPC . 128-bit static WEPD . Temporal Key Integrity ProtocolE . CCMP/AESView AnswerAnswer: C
The IEEE 802.11-2012 standard mandates this encryption for robust security network associations and the optional use of which other encryption?
The IEEE 802.11-2012 standard mandates this encryption for robust security network associations and the optional use of which other encryption?A . WEP, AESB . IPsec, AESC . MPPE, TKIPD . TKIP, WEPE . CCMP, TKIPView AnswerAnswer: E
What statement indicates why Mary cannot access the network from her laptop computer?
Given: Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements 802.1X/PEAP and the client devices are authenticating properly. When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication, and then tries to connect to the wireless...
You have been tasked with configuring a secure WLAN for 600 APs at the corporate offices. All the APs and employee Windows laptops have been configured for 802.1X/EAP.
You have been tasked with configuring a secure WLAN for 600 APs at the corporate offices. All the APs and employee Windows laptops have been configured for 802.1X/EAP. The domain user accounts are failing authentication with every attempt. After looking at some packet captures of the authentication failures, you have...
For an 802.1X/EAP solution to work properly with a WLAN, which two components must both support the same type of encryption?
For an 802.1X/EAP solution to work properly with a WLAN, which two components must both support the same type of encryption?A . Supplicant and authenticatorB . Authorizer and authenticatorC . Authenticator and authentication serverD . Supplicant and authentication serverView AnswerAnswer: A
Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to ensure proper staging procedures are followed?
Given: You must implement 7 APs for a branch office location in your organization. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest). Because each AP is managed directly through a web-based interface, what must be changed on every AP before enabling the WLANs to...
What device functions as the EAP Supplicant?
Given: An 802.1X/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is running RADIUS and it queries the domain controller for user credentials. A Windows client is accessing the network. What device functions as the EAP Supplicant?A...
In a point-to-point bridge environment where 802.1X/EAP is used for bridge authentication, what device in the network acts as the 802.1X supplicant?
In a point-to-point bridge environment where 802.1X/EAP is used for bridge authentication, what device in the network acts as the 802.1X supplicant?A . Nonroot bridgeB . WLAN controllerC . Root bridgeD . RADIUS serverE . Layer 3 core switchView AnswerAnswer: A