Which Extensible Authentication Protocol types are supported by the Cisco Unified Wireless Network?
Which Extensible Authentication Protocol types are supported by the Cisco Unified Wireless
Network?
Which five statements are results of that exchange using controller based network?
When using the enterprise-based authentication method for WPA2, a bidirectional handshake
exchange occurs between the client and the authenticator. Which five statements are results of
that exchange using controller based network? (Choose five.)
Which four parameters must be configured for local EAP-FAST on the controller?
Which four parameters must be configured for local EAP-FAST on the controller? (Choose four.)
where are the wireless encryption keys located during the active user session?
A client is attached to the Cisco Unified Wireless network using controllers. When the client is
using WPA2 and EAP authentication, where are the wireless encryption keys located during the
active user session? (Choose two.)
Which two attacks does Management Frame Protection help to mitigate?
Which two attacks does Management Frame Protection help to mitigate? (Choose two.)
Which method of encryption does the 802.11i standard use?
Which method of encryption does the 802.11i standard use?
What are the four types of wireless networks?
What are the four types of wireless networks? (Choose four)
Which type of authentication is used initially by a controller-based AP so that a guest client can get an IP a
Which type of authentication is used initially by a controller-based AP so that a guest client can get
an IP address?
What is the typical maximum range of a wireless PAN?
What is the typical maximum range of a wireless PAN?
True or false: A wireless PAN consumes little power from small handheld computer devices.
True or false: A wireless PAN consumes little power from small handheld computer devices.