What preventative measures are performed by a WIPS against intrusions?

What preventative measures are performed by a WIPS against intrusions?A . EAPoL Reject frame flood against a rogue APB . Evil twin attack against a rogue APC . Deauthentication attack against a classified neighbor APD . ASLEAP attack against a rogue APE . Uses SNMP to disable the switch port...

August 26, 2024 No Comments READ MORE +

Which method of guest management can be used by a company to gather valuable personal information about guest users?

Which method of guest management can be used by a company to gather valuable personal information about guest users?A . Social loginB . Kiosk modeC . Receptionist registrationD . Self-registrationE . Employee sponsorshipView AnswerAnswer: A

August 25, 2024 No Comments READ MORE +

Which of these terms best describes a measure of uncertainty associated with a random variable?

Which of these terms best describes a measure of uncertainty associated with a random variable?A . EntropyB . EncryptionC . EncapsulationD . EncodingView AnswerAnswer: A

August 24, 2024 No Comments READ MORE +

What are some of the purposes of the 4-Way Handshake? (Choose all that apply.)

What are some of the purposes of the 4-Way Handshake? (Choose all that apply.)A . Transfer the GTK to the supplicant.B . Derive a PTK from the PMK.C . Transfer the GMK to the supplicant.D . Confirm cipher suites.View AnswerAnswer: ABD

August 24, 2024 No Comments READ MORE +

What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)

What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)A . SNMPv1B . HTTPSC . TelnetD . TFTPE . FTPF . SSHv2View AnswerAnswer: BF

August 24, 2024 No Comments READ MORE +

Which of these tools are required for a proper WLAN security audit? (Choose all that apply.)

Which of these tools are required for a proper WLAN security audit? (Choose all that apply.)A . Spectrum analyzerB . WLAN protocol analyzerC . WLAN penetration testing software toolsD . Global positioning sensor (GPS)E . CamerasView AnswerAnswer: ABC

August 24, 2024 No Comments READ MORE +

Which portion of a well-written security policy is most likely missing from your company’s wireless security policy that caused this problem?

After consulting your written security policy, to meet the new demands of an industry standard with which your organization must be compliant, an administrator logs into your WLAN controller and changes the authentication and encryption configurations on all your APs. The help desk becomes overwhelmed with calls from angry users...

August 23, 2024 No Comments READ MORE +

Which one of the following technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with 802.11-2012 non-deprecated technologies?

You must support a TSN as you have older wireless equipment that will not support the required processing of AES encryption. Which one of the following technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with...

August 22, 2024 No Comments READ MORE +

Which of these authentication methods are supported by RADIUS and can be used for WLAN security? (Choose all that apply.)

Which of these authentication methods are supported by RADIUS and can be used for WLAN security? (Choose all that apply.)A . Hologram authenticationB . Captive web portal authenticationC . MAC authenticationD . TSA authenticationE . 802.1X/EAP authenticationView AnswerAnswer: BCE

August 22, 2024 No Comments READ MORE +

What 802.11 WLAN security problem is directly addressed by mutual authentication?

What 802.11 WLAN security problem is directly addressed by mutual authentication?A . Wireless hijacking attacksB . Weak password policiesC . MAC spoofingD . Disassociation attacksE . Offline dictionary attacksF . Weak Initialization VectorsView AnswerAnswer: A

August 21, 2024 No Comments READ MORE +