what network security services?
Wireless Intrusion Prevention Systems (WIPS) provide what network security services?
What is the most likely cause of the problem?
Given: Sam Smith has just completed the installation of a WLAN controller with 10 lightweight access points. All VLANs use one RADIUS server. The VLANs are configured as follows:
VLAN green (5 access points) – SSID green – Lightweight EAP (LEAP) authentication – CCMP cipher suite
VLAN orange (5 access points) – SSID orange ?802.1X/PEAPv0 authentication – TKIP cipher suite
Sam’s computer can successfully authenticate and browse the Internet when using the green VLAN.
Sam’s computer cannot authenticate when using the orange VLAN.
What is the most likely cause of the problem?
How are authenticated users assigned to groups so that they receive the correct security profile within the WL
Given: ABC Company has recently installed a WLAN controller that supports WPA2-Enterprise security. The administrator has configured a security profile on the WLAN controller for each group within the company (Manufacturing, Sales, and Engineering).
How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?
What security solution feature plays a role in adhering to this policy requirement?
Given: ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security solution feature plays a role in adhering to this policy requirement?
what logical connection to its controller?
Given: Most of today’s lightweight access points support PoE and can be placed anywhere on the network infrastructure instead of directly connected to a WLAN controller port.
A lightweight access point can make what logical connection to its controller?
What are the three major components of the Wi-Fi Protected Setup specification?
What are the three major components of the Wi-Fi Protected Setup specification?
what cryptographic element?
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
What are the two initially supported in-band Wi-Fi Protected Setup configuration methods?
What are the two initially supported in-band Wi-Fi Protected Setup configuration methods?
what is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism?
In an IEEE 802.11 environment, what is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism?
when is the 802.1X Controlled Port placed into the unblocked state?
In an IEEE 802.11-compliant WLAN, when is the 802.1X Controlled Port placed into the unblocked state?