Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?
Which of the following attacks come under the category of layer 2 Denial-of-Service attacks?
Each correct answer represents a complete solution. Choose all that apply.
What topics would you suggest for the security policy update?
Given: The network administrator at XYZ Company recently attended a training class on wireless security and realized that he still needs to update the corporate security policy to address WLAN technology.
The network administrator is trying to remember some of the items that should be addressed in the security policy update, and has asked you to help. What topics would you suggest for the security policy update? Choose 4
What is the most appropriate security measure you can recommend?
Your customer is very concerned about security for Wi-Fi at his home. He wants to make sure that only computers, he has authorized, can get on his Wi-Fi. What is the most appropriate security measure you can recommend?
Where will the encryption key be located during the active user session?
You work as a network administrator for Web Perfect Inc. You configure both WPA and EAP authentications on a client computer in the company’s wireless network. Where will the encryption key be located during the active user session? Each correct answer represents a part of the solution. Choose two.
What specific topics are appropriate in this policy meeting?
Given: Network users at a large machinery manufacturer have been asking the network administrator to implement an indoor WLAN.
The network administrator and the network manager have called a meeting of several senior management personnel to discuss WLAN implementation before taking any site survey or implementation steps. The first order of discussion in the meeting is corporate policy concerning implementation and use of WLAN technology. What specific topics are appropriate in this policy meeting? Choose 3
Which of the following protocols are used to secure a VPN connection?
Which of the following protocols are used to secure a VPN connection?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following standards of IEEE defines security of Wireless LAN (WLAN)?
Which of the following standards of IEEE defines security of Wireless LAN (WLAN)?
What attack will not be recognized by the WIPS?
Given: ABC Company performs top-secret government contract work and has recently purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their "NO WIRELESS" network security policy.
What attack will not be recognized by the WIPS?
Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?
Which of the following key types are defined in the 802.11i Authentication and Key Management (AKM)?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following radio frequencies is used by the IEEE 802.11a wireless network?
Which of the following radio frequencies is used by the IEEE 802.11a wireless network?