PrepAway - Latest Free Exam Questions & Answers

Tag: PW0-205

Exam PW0-205 , Wireless LAN Analysis

How are authenticated users assigned to groups so that …

Given:
ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile
on the WLAN controller for each group within the company (Marketing, Sales, and Engineering).
How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?

How can ABC Company use their existing user database fo…

Given:
ABC Company is an Internet Service Provider with thousands of customers. ABC’s customers are given login credentials for network access when they become a
customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and
would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they
implement a large-scale WPA2-Enterprise WLAN security solution?

What security best practices should be followed in this…

Given:
ABC Company is implementing a secure 802.11 WLAN at their headquarters (HQ) building in New York and at each of the 10 small, remote branch offices around
the United States. 802.1X/EAP is ABC’s preferred security solution, where possible. All access points (at the HQ building and all branch offices) connect to a single
WLAN controller located at HQ. Each branch office has only a single AP and minimal IT resources.
What security best practices should be followed in this deployment scenario?

what WLAN controller feature will likely be least valuable?

Given:
A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/
EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with
Microsoft NPS, querying Active Directory for user authentication. For this organization, as they update their WLAN infrastructure, what WLAN controller feature will
likely be least valuable?

What RADIUS features could be used by XYZ to assign the…

Given:
XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains
user-based access policies and would like to use the RADIUS server to facilitate network authorization. What RADIUS features could be used by XYZ to assign the
proper network permissions to users during authentication? (Choose 2)

What is a possible cause of the problem?

Given:
A WLAN consultant has just finished installing a WLAN controller with 15 controller-based APs. Two SSIDs with separate VLANs are configured for this network,
and both VLANs are configured to use the same RADIUS server. The SSIDs are configured as follows:
SSID Blue – VLAN 10 – Lightweight EAP (LEAP) authentication – CCMP cipher suite SSID Red – VLAN 20 – PEAPv0/EAP-TLS authentication – TKIP cipher suite

The consultant’s computer can successfully authenticate and browse the Internet when using the Blue SSID. The same computer cannot authenticate when using
the Red SSID.
What is a possible cause of the problem?


Page 4 of 11« First...23456...10...Last »