what authentication credential is passed using clear text across the wireless medium?
During 802.1X/LEAP authentication, what authentication credential is passed using clear text across the wireless medium?
What is the problem?
Given: ABC Company’s ERP WLAN has worked perfectly for the last 6 months. One morning, none of the company’s 10 users can connect to the company’s only access point.
When the administrator logs into the access point, there are hundreds of users associated using Open System authentication.
What is the problem?
what do you tell ABC Corporation about implementing MS-CHAPv2 authentication in a PPTP VPN?
Given: ABC Corporation is selecting a security solution for their new WLAN, and a PPTP VPN is their first consideration because it is included with both server and desktop operating systems. While the 128-bit encryption of Microsoft’s MPPE is considered strong enough to adhere to corporate security policy, the company is worried about security holes in MS-CHAPv2 authentication.
As a consultant, what do you tell ABC Corporation about implementing MS-CHAPv2 authentication in a PPTP VPN?
What task would save the most time if performed before the audit?
Given: A network security auditor is assessing an IEEE 802.11 network’s exposure to security holes.
What task would save the most time if performed before the audit?
what wireless security policy items should be implemented?
Given: John Smith often works from home and wireless hotspots rather than commuting to the office. His laptop connects to the office network over IEEE 802.11 WLANs.
To safeguard his data, what wireless security policy items should be implemented?
What WIPS parameter is configured to generate notifications?
What WIPS parameter is configured to generate notifications?
What statement about ABC Company’s WLAN security is true?
Given: ABC Company has a WLAN controller with three access points, 15 client devices, and uses WPA2-Personal for WLAN security.
What statement about ABC Company’s WLAN security is true?
What happens in a bit flipping attack against an IEEE 802.11 device?
What happens in a bit flipping attack against an IEEE 802.11 device?
What statements describe the limited effectiveness of locating rogue access points using WLAN discovery softwa
Given: You have a laptop computer with an integrated Wi-Fi compliant MiniPCI card.
What statements describe the limited effectiveness of locating rogue access points using WLAN discovery software such as NetStumbler, Kismet, or MacStumbler?