Which of the following means of wireless authentication is easily vulnerable to spoofing?
Which of the following means of wireless authentication is easily vulnerable to spoofing?
Which of the following is MOST likely the reason?
Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in
her office without supplying a username/password combination. Upon disconnecting from the wireless
network, she attempted to connect her personal tablet computer to the same wireless network and could
not connect.
Which of the following is MOST likely the reason?
Which of the following is preventing the device from connecting?
After entering the following information into a SOHO wireless router, a mobile device’s user reports being
unable to connect to the network:
PERMIT 0A: D1: FA. B1: 03: 37
DENY 01: 33: 7F: AB: 10: AB
Which of the following is preventing the device from connecting?
Which of the following BEST allows the analyst to restrict user access to approved devices?
A security analyst has been tasked with securing a guest wireless network. They recommend the company
use an authentication server but are told the funds are not available to set this up.
Which of the following BEST allows the analyst to restrict user access to approved devices?
what command-line utility can you use to ascertain it?
If you don’t know the MAC address of a Linux-based machine, what command-line utility can you use to
ascertain it?
Which of the following software features should be configured on the access points?
An organization does not want the wireless network name to be easily discovered. Which of the following
software features should be configured on the access points?
Which of the following allows for greater secrecy about this network during this initial phase of implementati
A security architect wishes to implement a wireless network with connectivity to the company’s internal
network. Before they inform all employees that this network is being put in place, the architect wants to
roll it out to a small test segment. Which of the following allows for greater secrecy about this network
during this initial phase of implementation?
While previously recommended as a security measure, disabling SSID broadcast is not effective against most att
While previously recommended as a security measure, disabling SSID broadcast is not effective against
most attackers because network SSIDs are:
Which of the following is the MOST likely reason for this issue?
A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the
vendors using older technology report that they are unable to access the wireless network after entering
the correct network information. Which of the following is the MOST likely reason for this issue?
Which of the following best practices makes a wireless network more difficult to find?
Which of the following best practices makes a wireless network more difficult to find?