What operations must occur before the virtual controlled port of the authenticator becomes unblocked? (Choose all that apply.)
What operations must occur before the virtual controlled port of the authenticator becomes unblocked? (Choose all that apply.)A . 802.1X/EAP authenticationB . 4-Way HandshakeC . 2-Way HandshakeD . RADIUS proxyView AnswerAnswer: AB
Which WLAN architectural models typically require support for 802.1Q tagging at the edge on the network when multiple user VLANs are required? (Choose all that apply.)
Which WLAN architectural models typically require support for 802.1Q tagging at the edge on the network when multiple user VLANs are required? (Choose all that apply.)A . Autonomous WLAN architectureB . Centralized WLAN architectureC . Distributed WLAN architectureD . None of the aboveView AnswerAnswer: AC
He configured the laptop to use WEP key 1 to encrypt its data. He configured the AP to use WEP key 2 to encrypt its data. Will this configuration work?
Evan has configured a laptop and an AP, each with two WEP keys. WEP key 1 is the same on both devices, and WEP key 2 is the same on both devices. He configured the laptop to use WEP key 1 to encrypt its data. He configured the AP to...
What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)
What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)A . 802.11w frame protection protects against some Layer 2 denial-of-service (DoS) attacks, but it cannot prevent all types of Layer 2 DoS attacks.B . When frame protection is in use, the PHY preamble and header as well as the...