Which one of the following statements is true related t…
Given:
Your organization is using EAP as an authentication framework with a specific type that meets the requirements of your corporate policies.
Which one of the following statements is true related to this implementation?
Which one of the following is a valid reason to avoid t…
Which one of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?
What TKIP feature was introduced to counter the weak in…
What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?
What are the three roles of the 802.1X framework, as de…
What are the three roles of the 802.1X framework, as defined by the 802.1X standard, that are performed by the client STA, the AP (or WLAN controller), and the
RADIUS server? (Choose 3)
what single wireless security practice will provide the…
Given:
Fred works primarily from home and public wireless hot-spots rather than commuting to the office. He frequently accesses the office network remotely from his Mac
laptop using the local 802.11 WLAN.
In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
What must you do to implement these APs in a secure man…
Given:
You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet. What must you do to implement these APs in a secure manner
beyond the normal indoor AP implementations? (Choose the single best answer.)
what must be changed on every AP before enabling the W…
Given:
You must implement 7 APs for a branch office location in your organization. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).
Because each AP is managed directly through a web-based interface, what must be changed on every
AP before enabling the WLANs to ensure proper staging procedures are followed?
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-…
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
What client stations possess the keys that are necessar…
You have an AP implemented that functions only using 802.11-2012 standard methods for the WLAN
communications on the RF side and implementing multiple SSIDs and profiles on the management side configured as follows:
1. SSID: Guest VLAN 90 Security: Open with captive portal authentication 2 current clients
2. SSID: ABCData VLAN 10 Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP 5 current clients
3. SSID: ABCVoice VLAN 60 Security: WPA2-Personal 2 current clients Two client STAs are connected to ABCData and can access a media server that requires
authentication at the Application Layer and is used to stream multicast video streams to the clients. What client stations possess the keys that are necessary to
decrypt the multicast data packets carrying these videos?
How many unique GTKs and PTKs are currently in place in…
A single AP is configured with three separate WLAN profiles, as follows:
1. SSID: ABCData BSSID: 00:11:22:00:1F:C3 VLAN 10 Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP 3 current clients
2. SSID: ABCVoice BSSID: 00:11:22:00:1F:C4 VLAN 60 Security: WPA2-Personal with AES-CCMP 2 current clients
3. SSID: Guest BSSID: 00:11:22:00:1F:C5 VLAN 90 Security: Open with captive portal authentication 3 current clients
Three STAs are connected to ABCData. Three STAs are connected to Guest. Two STAs are connected to ABCVoice.
How many unique GTKs and PTKs are currently in place in this scenario?