How are authenticated users assigned to groups so that …
Given:
ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile
on the WLAN controller for each group within the company (Marketing, Sales, and Engineering).
How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?
How can ABC Company use their existing user database fo…
Given:
ABC Company is an Internet Service Provider with thousands of customers. ABC’s customers are given login credentials for network access when they become a
customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and
would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they
implement a large-scale WPA2-Enterprise WLAN security solution?
What security best practices should be followed in this…
Given:
ABC Company is implementing a secure 802.11 WLAN at their headquarters (HQ) building in New York and at each of the 10 small, remote branch offices around
the United States. 802.1X/EAP is ABC’s preferred security solution, where possible. All access points (at the HQ building and all branch offices) connect to a single
WLAN controller located at HQ. Each branch office has only a single AP and minimal IT resources.
What security best practices should be followed in this deployment scenario?
what WLAN controller feature will likely be least valuable?
Given:
A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/
EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with
Microsoft NPS, querying Active Directory for user authentication. For this organization, as they update their WLAN infrastructure, what WLAN controller feature will
likely be least valuable?
what network function?
Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?
What RADIUS features could be used by XYZ to assign the…
Given:
XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains
user-based access policies and would like to use the RADIUS server to facilitate network authorization. What RADIUS features could be used by XYZ to assign the
proper network permissions to users during authentication? (Choose 2)
What protocols allow a network administrator to securel…
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)
what component is protected inside the TLS tunnel so th…
When using a tunneled EAP type, such as PEAP, what component is protected inside the TLS tunnel so that it is not sent in clear text across the wireless medium?
What device functions as the 802.1X/ EAP Authenticator?
Given:
Your network implements an 802.1X/EAP-based wireless security solution. A WLAN controller is installed and manages seven APs. FreeRADIUS is used for the
RADIUS server and is installed on a dedicated server named SRV21. One example client is a MacBook Pro with 8 GB RAM. What device functions as the 802.1X/
EAP Authenticator?
What is a possible cause of the problem?
Given:
A WLAN consultant has just finished installing a WLAN controller with 15 controller-based APs. Two SSIDs with separate VLANs are configured for this network,
and both VLANs are configured to use the same RADIUS server. The SSIDs are configured as follows:
SSID Blue – VLAN 10 – Lightweight EAP (LEAP) authentication – CCMP cipher suite SSID Red – VLAN 20 – PEAPv0/EAP-TLS authentication – TKIP cipher suite
The consultant’s computer can successfully authenticate and browse the Internet when using the Blue SSID. The same computer cannot authenticate when using
the Red SSID.
What is a possible cause of the problem?