Which of the following is preventing the device from co…
After entering the following information into a SOHO wireless router, a mobile device’s user reports being
unable to connect to the network:
PERMIT 0A: D1: FA. B1: 03: 37
DENY 01: 33: 7F: AB: 10: AB
Which of the following is preventing the device from connecting?
Which of the following is MOST likely the reason?
Ann, a sales manager, successfully connected her company-issued smartphone to the wireless network in her
office without supplying a username/password combination. Upon disconnecting from the wireless network, she
attempted to connect her personal tablet computer to the same wireless network and could not connect.
Which of the following is MOST likely the reason?
Which of the following means of wireless authentication…
Which of the following means of wireless authentication is easily vulnerable to spoofing?
Which credential type authentication method BEST fits t…
Matt, a systems security engineer, is determining which credential-type authentication to use within a planned
802.1x deployment. He is looking for a method that does not require a client certificate, has a server side
certificate, and uses TLS tunnels for encryption. Which credential type authentication method BEST fits these
requirements?
Which of the following would satisfy wireless network i…
Which of the following would satisfy wireless network implementation requirements to use mutual
authentication and usernames and passwords?
Which of the following BEST describes the weakness in W…
Which of the following BEST describes the weakness in WEP encryption?
Which of the following should the administrator implement?
A security administrator must implement a network authentication solution which will ensure encryption of user
credentials when users enter their username and password to authenticate to the network.
Which of the following should the administrator implement?
Configuring key/value pairs on a RADIUS server is assoc…
Configuring key/value pairs on a RADIUS server is associated with deploying of the following:
Which of the following should be implemented?
A security administrator must implement a wireless security system, which will require users to enter a 30
character ASCII password on their accounts. Additionally the system must support 3DS wireless encryption.
Which of the following should be implemented?
Which of the following is a step in deploying a WPA2-En…
Which of the following is a step in deploying a WPA2-Enterprise wireless network?