What three cipher suites are specified by the IEEE 802.11-2007 standard?
What three cipher suites are specified by the IEEE 802.11-2007 standard? Choose 3
which features for strong security?
The IEEE 802.11-2007 standard specifies which features for strong security? Choose 2
what device in the network acts as the 802.1X Authenticator?
In a point-to-multipoint bridge environment where 802.1X/EAP is used for bridge authentication, what device in the network acts as the 802.1X Authenticator?
How would you respond?
Given: You are the network administrator for ABC Company. Your manager has recently attended a wireless security seminar. The seminar speaker insisted that a wireless network could be hidden from potential intruders if you disabled the broadcasting of the SSID in Beacons and configured the access points not to respond to Probe Request frames that have a null SSID field. Your manager asks your opinion about these security practices. How would you respond? Choose 2
What two devices, when implemented together, will give XYZ Company the features that will allow them to meet t
Given: XYZ Company has decided to install an 802.11 WLAN system that will support 250 wireless users, but they are concerned about network security. They have decided to implement three mandatory security mechanisms: 1) Role-Based Access Control, 2) 802.1X/PEAP, and 3) Bandwidth Management.
What two devices, when implemented together, will give XYZ Company the features that will allow them to meet their security goals? Choose 2
In a single channel architecture (SCA) WLAN system, 802.11n (High Throughput) APs should not sharean ESSID wit
In a single channel architecture (SCA) WLAN system, 802.11n (High Throughput) APs should not share
an ESSID with 802.11g (ERP-OFDM) APs because _________.
How best can throughput capacity be uniquely added to a single channel architecture (SCA) WLAN system?
How best can throughput capacity be uniquely added to a single channel architecture (SCA) WLAN system?
What problems exist for a multiple channel architecture (MCA) WLAN when its APs are all operating at full powe
What problems exist for a multiple channel architecture (MCA) WLAN when its APs are all operating at full power (typically 100mW)? Choose 2
What statement describes the use of communication protocols between WLAN controllers and lightweight access po
What statement describes the use of communication protocols between WLAN controllers and lightweight access points (APs)? Choose 2
what situation has the potential to adversely affect the proper operation of your Clause 33 compliant access p
When using 802.3-2005, Clause 33 compliant Power-over-Ethernet switches at the network edge, what situation has the potential to adversely affect the proper operation of your Clause 33 compliant access points?