What security mechanism is being used on the WLAN?
Given:
A WLAN protocol analyzer trace reveals the following sequence of frames (excluding the ACK frames):
1) 802.11 Probe Req and 802.11 Probe Rsp
2) 802.11 Auth and then another 802.11 Auth
3) 802.11 Assoc Req and 802.11 Assoc Rsp
4) EAPOL-KEY
5) EAPOL-KEY
6) EAPOL-KEY
7) EAPOL-KEY
What security mechanism is being used on the WLAN?
what baseline function MUST be performed in order to id…
After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline
function MUST be performed in order to identify security threats?
What parameter is needed to physically locate rogue APs…
Given:
WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?
what secure protocol may be used by the WNMS to issue …
When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what
secure protocol may be used by the WNMS to issue configuration changes to APs?
What preventative measures are performed by a WIPS agai…
What preventative measures are performed by a WIPS against intrusions?
What field in the RSN information element (IE) will ind…
What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?
What security vulnerabilities may result from a lack of…
What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)
What attack cannot be detected by a Wireless Intrusion …
What attack cannot be detected by a Wireless Intrusion Prevention System (WIPS)?
what frame could you see the existence or non-existence…
Given:
You are the WLAN administrator in your organization and you are required to monitor the network and ensure all active WLANs are providing RSNs. You have a
laptop protocol analyzer configured. In what frame could you see the existence or non-existence of proper RSN configuration parameters for each BSS through the
RSN IE?
Snonce sent from supplicant to authenticator, MIC inclu…
The following numbered items show some of the contents of each of the four frames exchanged during the 4-way handshake:
1. Encrypted GTK sent
2. Confirmation of temporal key installation
3. Anonce sent from authenticator to supplicant
4. Snonce sent from supplicant to authenticator, MIC included Arrange the frames in the correct sequence beginning with the start of the 4-way handshake.