What is a likely reason that Joe cannot connect to the …
Joe’s new laptop is experiencing difficulty connecting to ABC Company’s 802.11 WLAN using 802.1X/EAP PEAPv0. The company’s wireless network administrator
assured Joe that his laptop was authorized in the WIPS management console for connectivity to ABC’s network before it was given to him. The WIPS termination
policy includes alarms for rogue stations, roque APs, DoS attacks and unauthorized roaming.
What is a likely reason that Joe cannot connect to the network?
What task should be performed at the beginning of the a…
Given:
A network security auditor is preparing to perform a comprehensive assessment of an 802.11ac network’s security.
What task should be performed at the beginning of the audit to maximize the auditor’s ability to expose network vulnerabilities?
what must be done as part of the WIPS installation?
For a WIPS system to identify the location of a rogue WLAN device using location patterning (RF fingerprinting), what must be done as part of the WIPS
installation?
what purposes?
Wireless Intrusion Prevention Systems (WIPS) are used for what purposes? (Choose 3)
What portable solution would be recommended for XYZ to …
Given:
XYZ Hospital plans to improve the security and performance of their Voice over Wi-Fi implementation and will be upgrading to 802.11n phones with 802.1X/EAP
authentication. XYZ would like to support fast secure roaming for the phones and will require the ability to troubleshoot reassociations that are delayed or dropped
during inter-channel roaming.
What portable solution would be recommended for XYZ to troubleshoot roaming problems?
Which one of the following technologies will you use on…
You must support a TSN as you have older wireless equipment that will not support the required processing of AES encryption. Which one of the following
technologies will you use on the network so that a TSN can be implemented that would not be required in a network compliant with 802.11-2012
non-deprecated technologies?
What single WLAN security feature should be implemented…
Given:
The Marketing department’s WLAN users need to reach their file and email server as well as the Internet, but should not have access to any other network
resources. What single WLAN security feature should be implemented to comply with these requirements?
What kind of signal is described?
While seeking the source of interference on channel 11 in your 802.11n WLAN running within 2.4 GHz, you notice a signal in the spectrum analyzer real time FFT
display. The signal is characterized with the
greatest strength utilizing only 1-2 megahertz of bandwidth and it does not use significantly more bandwidth until it has weakened by roughly 20 dB. At approximately
-70 dB, it spreads across as much as 35 megahertz of bandwidth.
What kind of signal is described?
what risks are still associated with implementing the g…
Given:
Many corporations configure guest VLANs on their WLAN controllers that allow visitors to have Internet access only. The guest traffic is tunneled to the DMZ to
prevent some security risks. In this deployment, what risks are still associated with implementing the guest VLAN without any advanced traffic monitoring or filtering
features enabled? (Choose 2)
what is the described utility used?
You are using a utility that takes input and generates random output. For example, you can provide the
input of a known word as a secret word and then also provide another known word as salt input. When you process the input it generates a secret code which is a
combination of letters and numbers with case sensitivity. For what is the described utility used? (Choose 3)