What kind of signal is described?
While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT
display. The signal is characterized with the
greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately
-70 dB, it spreads across as much as 35 megahertz of bandwidth.
What kind of signal is described?
what risks are still associated with implementing the g…
Given:
Many corporations configure guest VLANs on their WLAN controllers that allow visitors to have Internet access only. The guest traffic is tunneled to the DMZ to
prevent some security risks. In this deployment, what risks are still associated with implementing the guest VLAN without any advanced traffic monitoring or filtering
features enabled? (Choose 2)
what is the described utility used?
You are using a utility that takes input and generates random output. For example, you can provide the
input of a known word as a secret word and then also provide another known word as salt input. When you process the input it generates a secret code which is a
combination of letters and numbers with case sensitivity. For what is the described utility used? (Choose 3)
What option specifies the best approach to minimize leg…
Given:
You support a coffee shop and have recently installed a free 802.11ac wireless hot-spot for the benefit of your customers. You want to minimize legal risk in the
event that the hot-spot is used for illegal Internet activity.
What option specifies the best approach to minimize legal risk at this public hot-spot while maintaining an open venue for customer Internet access?
Where must the X.509 server certificate and private key…
Given:
Your company has just completed installation of an IEEE 802.11 WLAN controller with 20
controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user
database was already in use, a RADIUS server was installed and is querying authentication requests to the LDAP server. Where must the X.509 server certificate
and private key be installed in this network?
what process immediately follows the 802.11 association…
The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what
process immediately follows the 802.11 association procedure?
What security controls would you suggest?
Given:
ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES-CCMP to secure their corporate wireless data. They wish to
implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hot-spot include:
-Cannot access corporate network resources
-Network permissions are limited to Internet access
-All stations must be authenticated
What security controls would you suggest? (Choose the single best answer.)
what is the purpose of the ANonce and SNonce?
In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce? (Choose 2)
what cryptographic element?
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
What security characteristics and/or components play a …
Given:
ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security
solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security characteristics and/or components play a role
in preventing data decryption? (Choose 2)