what type of WLAN attack?
TKIP uses a per-MPDU TKIP sequence counter (TSC) to prevent what type of WLAN attack?
Where must the x.509 server certificate reside in this network?
Given: Your company has just completed installation of an IEEE 802.11 WLAN controller with 10 lightweight access points. The Chief Security Officer has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism.
Where must the x.509 server certificate reside in this network?
What statement regarding the nonces used in the IEEE 802.11 4-Way Handshake is true?
Given: The IEEE 802.11 standard’s 4-Way Handshake is illustrated.
What statement regarding the nonces used in the IEEE 802.11 4-Way Handshake is true?
what new security solution do you suggest?
Given: ABC Corporation’s 802.11 WLAN is comprised of a single WLAN controller and 30 access points. They implemented IPSec VPN technology to secure their wireless communication because it was the strongest security solution available at the time it was implemented.
IT management has decided to implement wVoIP and is concerned with security since today’s wVoIP phones do not support IPSec.
As the wireless network administrator, what new security solution do you suggest?
What AAA model is described?
Given: ABC University has an Information Technology (IT) building where the Active Directory server is located. They are installing a small WLAN controller and a small RADIUS server in each of 20 campus buildings. WLAN encryption keys are generated by the RADIUS servers. Each RADIUS server will proxy user authentication to the Active Directory server in the IT building.
What AAA model is described?
What WLAN security solution meets this requirement?
Given: XYZ Company has recently installed an ERP WLAN. The company needs the ability to control access to network services, such as file shares, intranet web servers, and Internet access based on an employee’s job responsibilities.
What WLAN security solution meets this requirement?
What is the purpose of the 802.11 PeerKey Handshake in a WLAN BSS?
What is the purpose of the 802.11 PeerKey Handshake in a WLAN BSS?
what are someperformance-limiting factors?
When using a VPN-enabled WLAN controller, what are some
performance-limiting factors?
what should be the immediate response of the network administrative staff?
When a rogue access point is discovered on a network, what should be the immediate response of the network administrative staff?
what is required to manage the access points from a workstation located on the management segment?
Given: The ABC Hospital IT staff has agreed that an Enterprise Encryption Gateway (EEG) using a strong, proprietary, layer-2 encryption technique meets their corporate wireless security policy requirements. The access points are located on the encrypted segment of the network.
What option indicates what is required to manage the access points from a workstation located on the management segment?