Which of the following cryptographic products would be …
A network administrator has been tasked with securing the WLAN. Which of the following cryptographic
products would be used to provide the MOST secure environment for the WLAN?
Which of the following wireless security technologies c…
Which of the following wireless security technologies continuously supplies new keys for WEP?
Which of the following would be the BEST way to mitigat…
Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to connect to that
AP and gain unauthorized access. Which of the following would be the BEST way to mitigate this issue and still
provide coverage where needed? (Choose two.)
Which of the following best practices makes a wireless …
Which of the following best practices makes a wireless network more difficult to find?
Which of the following is the MOST likely reason for th…
A company provides secure wireless Internet access for visitors and vendors working onsite. Some of the
vendors using older technology report that they are unable to access the wireless network after entering the
correct network information. Which of the following is the MOST likely reason for this issue?
While previously recommended as a security measure, dis…
While previously recommended as a security measure, disabling SSID broadcast is not effective against most
attackers because network SSIDs are:
Which of the following allows for greater secrecy about…
A security architect wishes to implement a wireless network with connectivity to the company’s internal network.Before they inform all employees that this network is being put in place, the architect wants to roll it out to a
small test segment. Which of the following allows for greater secrecy about this network during this initial phase
of implementation?
Which of the following software features should be conf…
An organization does not want the wireless network name to be easily discovered. Which of the following
software features should be configured on the access points?
what command-line utility can you use to ascertain it?
If you don’t know the MAC address of a Linux-based machine, what command-line utility can you use to
ascertain it?
Which of the following BEST allows the analyst to restr…
A security analyst has been tasked with securing a guest wireless network. They recommend the company usean authentication server but are told the funds are not available to set this up.
Which of the following BEST allows the analyst to restrict user access to approved devices?