what additional security mechanisms should be considered?
Given: ABC Company is implementing a secure 802.11 WLAN at their headquarters building in New York and at each of the 10 remote branch offices around the world.
If all access points (at the headquarters building and all branch offices) connect to a single WLAN controller located at the headquarters building, what additional security mechanisms should be considered?
What feature is LEAST valuable when selecting the type of WLAN controller to purchase?
Given: A large organization is designing a secure, scalable, and manageable ERP WLAN that will support hundreds of users.
What feature is LEAST valuable when selecting the type of WLAN controller to purchase?
what network function?
Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?
what security precaution should be taken?
To avoid known vulnerabilities in authentication and key management of Wi-Fi Protected Setup, what security precaution should be taken?
How should this be accomplished?
Given: XYZ Company has recently installed a WLAN controller and a RADIUS server. Corporate wireless users need to be given access to the Internet and their division’s resources.
How should this be accomplished?
How can ABC Company use their existing user database for wireless user authentication as they implement a larg
Given: ABC Company is an Internet Service Provider with thousands of customers. It uses an LDAP server as the central user credential database.
How can ABC Company use their existing user database for wireless user authentication as they implement a large-scale WPA2-Enterprise WLAN security solution?
What WLAN system type is best suited for ABC Company?
Given: ABC Company wants to implement a secure wVoIP system that is compliant with the IEEE 802.11 standard and has the fastest roaming capability available over a layer 3 infrastructure.
What WLAN system type is best suited for ABC Company?
What security controls would you suggest?
Given: ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and CCMP to secure their corporate wireless stations. They wish to implement a hotspot for guest users to have Internet access, but want to implement some security controls. The security requirements for the hotspot include:
Cannot access corporate network resources
Cannot attack other guest users
Only provides Internet access
Only authenticated stations are allowed to use the hotspot
What security controls would you suggest?
what type of attacks?
Given: You manage a wireless network that services 200 wireless users.
Your facility requires 20 access points, and you have installed an IEEE 802.11-compliant implementation of 802.1X/LEAP (CCMP/AES) as an authentication and encryption solution.
In this configuration, the wireless network is susceptible to what type of attacks?
How does the WIPS categorize the new AP?
Given: A new access point is connected to an authorized network segment and is detected by a WIPS.
How does the WIPS categorize the new AP?