Which statement explains why the frame exchange from on…
You are using a protocol analyzer for random checks of activity on the WLAN. In the process, you notice two different EAP authentication processes. One process
(STA1) used seven EAP frames (excluding ACK frames) before the 4-way handshake and the other (STA2) used 11 EAP frames (excluding ACK frames) before
the 4-way handshake.
Which statement explains why the frame exchange from one STA required more frames than the frame exchange from another STA when both authentications
were successful? (Choose the single most probable answer given a stable WLAN.)
What kind of signal is displayed in the spectrum analyzer?
While performing a manual scan of your environment using a spectrum analyzer on a laptop computer, you notice a signal in the real time FFT view. The signal is
characterized by having peak power centered on channel 11 with an approximate width of 20 MHz at its peak. The signal widens to approximately 40 MHz after it
has weakened by about 30 dB.
What kind of signal is displayed in the spectrum analyzer?
What wireless authentication technologies may build a T…
What wireless authentication technologies may build a TLS tunnel between the supplicant and the authentication server before passing client authentication
credentials to the authentication server? (Choose 3)
What is one advantage of using EAP-TTLS instead of EAP-…
What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?
What policy would help mitigate the impact of peer-to-p…
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public
access networks such as wireless hot-spots?
what should you ensure you possess?
Given:
ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you
ensure you possess?
what password-related items should be addressed?
As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client
devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods. When writing the 802.11 security policy,
what password-related items should be addressed?
what deployment scenarios would it be desirable to enab…
In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?
how should a wireless security professional address the…
As a part of a large organization’s security policy, how should a wireless security professional address the problem of rogue access points?
What elements should be addressed by a WLAN security policy?
What elements should be addressed by a WLAN security policy? (Choose 2)