What are two modules of the CCX Lite program?
What are two modules of the CCX Lite program? (Choose two.)
where are the wireless encryption keys located during the active user session?
A client is attached to the Cisco Unified Wireless Network using controllers.
When the client is using WPA2 and EAP authentication, where are the wireless encryption keys
located during the active user session? (Choose two.)
Which Extensible Authentication Protocol types are supported by the Cisco Unified Wireless Network?
Which Extensible Authentication Protocol types are supported by the Cisco Unified Wireless
Network?
Which four parameters must be configured for local EAP-FAST on the controller?
Which four parameters must be configured for local EAP-FAST on the controller? (Choose four.)
Which method of encryption does the 802.11i standard use?
Which method of encryption does the 802.11i standard use?
Which type of authentication is used initially by a controller-based AP so that a guest client can get an IP a
Which type of authentication is used initially by a controller-based AP so that a guest client can get
an IP address?
why is it still possible for a rogue client to launch a DOS attack?
In a typical wireless network using WPA, WPA2 or VPN, why is it still possible for a rogue client to
launch a DOS attack?
Which two steps must you take to provide maximum security when using a pre-shared key?
Strong security is required, but a centralized RADIUS authenticator has not been implemented.
Which two steps must you take to provide maximum security when using a pre-shared key?
(Choose two.)
What is the impact of configuring a single SSID to support TKIP and AES encryption simultaneously?
What is the impact of configuring a single SSID to support TKIP and AES encryption
simultaneously?
Which key is established using the four-way handshake during the WPA authentication process?
Which key is established using the four-way handshake during the WPA authentication process?