What purpose does the encrypted MIC play in protecting …
Given:
When the CCMP cipher suite is used for protection of data frames, 16 bytes of overhead are added to the
Layer 2 frame. 8 of these bytes comprise the MIC.
What purpose does the encrypted MIC play in protecting the data frame?
What drawbacks initially prevented the widespread accep…
What drawbacks initially prevented the widespread acceptance and use of Opportunistic Key Caching (OKC)?
What security benefits are provided by endpoint securit…
What security benefits are provided by endpoint security solution software? (Choose 3)
What answer correctly pairs the AAA component with the …
Given:
AAA is an architectural framework used to provide three separate security components in a network. Listed below are three phrases that each describe one aspect
of the AAA framework. Option-1 — This AAA function is performed first and validates user identify prior to determining the network resources to which they will be
granted access.
Option-2 — This function is used for monitoring and auditing purposes and includes the collection of data that identifies what a user has done while connected.
Option-3 — This function is used to designate permissions to a particular user. What answer correctly pairs the AAA component with the descriptions provided
above?
What statements are true about 802.11-2012 Protected Ma…
What statements are true about 802.11-2012 Protected Management Frames? (Choose 2)
what frame types may be protected with data confidentiality?
When TKIP is selected as the pairwise cipher suite, what frame types may be protected with data confidentiality? (Choose 2)
What part of the 802.11 frame is always protected from …
Given:
ABC Company secures their network with WPA2-Personal authentication and AES-CCMP encryption. What part of the 802.11 frame is always protected from
eavesdroppers by this type of security?
What processes can be used to force an authenticated WL…
Given:
Your network includes a controller-based WLAN architecture with centralized data forwarding. The AP builds an encrypted tunnel to the WLAN controller. The
WLAN controller is uplinked to the network via a trunked 1 Gbps Ethernet port supporting all necessary VLANs for management, control, and client traffic. What
processes can be used to force an authenticated WLAN client’s data traffic into a specific VLAN as it exits the WLAN controller interface onto the wired uplink?
(Choose 3)
What WLAN security solution meets this requirement?
Given:
XYZ Company has recently installed an 802.11ac WLAN. The company needs the ability to control access to network services, such as file shares, intranet web
servers, and Internet access based on an employee’s job responsibilities.
What WLAN security solution meets this requirement?
what protocol must the selected RADIUS server support?
When implementing a WPA2-Enterprise security solution, what protocol must the selected RADIUS server support?