What attack cannot be detected by a Wireless Intrusion …
What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?
what frame could you see the existence or non-existence…
Given:
You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a
laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the
RSN IE?
Snonce sent from supplicant to authenticator, MIC inclu…
The following numbered items show some of the contents of each of the four frames exchanged during the 4-way handshake:
1. Encrypted GTK sent
2. Confirmation of temporal key installation
3. Anonce sent from authenticator to supplicant
4. Snonce sent from supplicant to authenticator, MIC included Arrange the frames in the correct sequence beginning with the start of the 4-way handshake.
What is a likely reason that Joe cannot connect to the …
Joe’s new laptop is experiencing difficulty connecting to ABC Company’s 802.11 WLAN using 802.1X/EAP PEAPv0. The company’s wireless network administrator
assured Joe that his laptop was authorized in the WIPS management console for connectivity to ABC’s network before it was given to him. The WIPS termination
policy includes alarms for rogue stations, roque APs, DoS attacks and unauthorized roaming.
What is a likely reason that Joe cannot connect to the network?
What task should be performed at the beginning of the a…
Given:
A network security auditor is preparing to perform a comprehensive assessment of an 802.11ac network’s security.
What task should be performed at the beginning of the audit to maximize the auditor’s ability to expose network vulnerabilities?
what must be done as part of the WIPS installation?
For a WIPS system to identify the location of a rogue WLAN device using location patterning (RF fingerprinting), what must be done as part of the WIPS
installation?
what purposes?
Wireless Intrusion Prevention Systems (WIPS) are used for what purposes? (Choose 3)
What portable solution would be recommended for XYZ to …
Given:
XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP
authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped
during inter-channel roaming.
What portable solution would be recommended for XYZ to troubleshoot roaming problems?
Which one of the following technologies will you use on…
You must support a TSN as you have older wireless equipment that will not support the required processing of AES encryption. Which one of the following
technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with 802.11-2012
non-deprecated technologies?
What single WLAN security feature should be implemented…
Given:
The Marketing department’s WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network
resources. What single WLAN security feature should be implemented to comply with these requirements?