What are four features of WPA?
What are four features of WPA? (Choose four.)
Which five options are results of that exchange being used on a controller-based network?
When the enterprise-based authentication method is used for WPA2, a bidirectional handshake
exchange occurs between the client and the authenticator.
Which five options are results of that exchange being used on a controller-based network?
(Choose five.)
which type of connection is created between the controller based AP and the client?
When a guest client is authenticated, which type of connection is created between the controller
based AP and the client?
Which two MFP requirements protect the network?
Cisco Client Management Frame Protection is running on a mobility group with two controllers.
Which two MFP requirements protect the network? (Choose two.)
Which open standard defines the combination of Extensible Authentication Protocol with Advanced Encryption Sta
Which open standard defines the combination of Extensible Authentication Protocol with
Advanced Encryption Standard for providing strong wireless LAN client security?
which three pieces of source identification information can be used by the controller for an Access-Request me
When a wireless client is authenticated in a controller-based wireless network, which three pieces
of source identification information can be used by the controller for an Access-Request message
that is sent to an external RADIUS server? (Choose three.)
Which official port should be used when configuring external RADIUS authentication on a Cisco WLC version 7.0?
Which official port should be used when configuring external RADIUS authentication on a Cisco
WLC version 7.0?
How many RADIUS servers can be configured globally and per WLAN on a Cisco WLC version 7.0?
How many RADIUS servers can be configured globally and per WLAN on a Cisco WLC version
7.0?
Which statement about the impact of configuring a single SSID to support TKIP and AES encryption simultaneousl
Which statement about the impact of configuring a single SSID to support TKIP and AES
encryption simultaneously is true?
which two functions is the pre-shared key used?
When the pre-shared key authentication method is used for WPA or WPA2, for which two
functions is the pre-shared key used? (Choose two.)