what command-line utility can you use to ascertain it?
If you don’t know the MAC address of a Linux-based machine, what command-line utility can you
use to ascertain it?
Which of the following software features should be configured on the access points?
An organization does not want the wireless network name to be easily discovered. Which of the
following software features should be configured on the access points?
Which of the following allows for greater secrecy about this network during this initial phase of implementati
A security architect wishes to implement a wireless network with connectivity to the company’s
internal network. Before they inform all employees that this network is being put in place, the
architect wants to roll it out to a small test segment. Which of the following allows for greater
secrecy about this network during this initial phase of implementation?
While previously recommended as a security measure, disabling SSID broadcast is not effective against most att
While previously recommended as a security measure, disabling SSID broadcast is not effective
against most attackers because network SSIDs are:
Which of the following is the MOST likely reason for this issue?
A company provides secure wireless Internet access for visitors and vendors working onsite.
Some of the vendors using older technology report that they are unable to access the wireless
network after entering the correct network information. Which of the following is the MOST likely
reason for this issue?
Which of the following best practices makes a wireless network more difficult to find?
Which of the following best practices makes a wireless network more difficult to find?
Which of the following would be the BEST way to mitigate this issue and still provide coverage where needed?
Jane, the security administrator, sets up a new AP but realizes too many outsiders are able to
connect to that AP and gain unauthorized access. Which of the following would be the BEST way
to mitigate this issue and still provide coverage where needed? (Select TWO).
Which of the following wireless security technologies continuously supplies new keys for WEP?
Which of the following wireless security technologies continuously supplies new keys for WEP?
Which of the following cryptographic products would be used to provide the MOST secure environment for the WLA
A network administrator has been tasked with securing the WLAN. Which of the following
cryptographic products would be used to provide the MOST secure environment for the WLAN?
Which of the following should be configured on the client to fix this issue?
An access point has been configured for AES encryption but a client is unable to connect to it.
Which of the following should be configured on the client to fix this issue?