What option specifies the best approach to minimize leg…
Given:
You support a coffee shop and have recently installed a free 802.11ac wireless hot-spot for the benefit of your customers. You want to minimize legal risk in the
event that the hot-spot is used for illegal Internet activity.
What option specifies the best approach to minimize legal risk at this public hot-spot while maintaining an open venue for customer Internet access?
Where must the X.509 server certificate and private key…
Given:
Your company has just completed installation of an IEEE 802.11 WLAN controller with 20
controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user
database was already in use, a RADIUS server was installed and is querying authentication requests to the LDAP server. Where must the X.509 server certificate
and private key be installed in this network?
what process immediately follows the 802.11 association…
The IEEE 802.11 standard defined Open System authentication as consisting of two auth frames and two assoc frames. In a WPA2-Enterprise network, what
process immediately follows the 802.11 association procedure?
What security controls would you suggest?
Given:
ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES-CCMP to secure their corporate wireless data. They wish to
implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hot-spot include:
-Cannot access corporate network resources
-Network permissions are limited to Internet access
-All stations must be authenticated
What security controls would you suggest? (Choose the single best answer.)
what is the purpose of the ANonce and SNonce?
In the basic 4-way handshake used in secure 802.11 networks, what is the purpose of the ANonce and SNonce? (Choose 2)
what cryptographic element?
The IEEE 802.11 Pairwise Transient Key (PTK) is derived from what cryptographic element?
What security characteristics and/or components play a …
Given:
ABC Company is deploying an IEEE 802.11-compliant wireless security solution using 802.1X/EAP authentication. According to company policy, the security
solution must prevent an eavesdropper from decrypting data frames traversing a wireless connection. What security characteristics and/or components play a role
in preventing data decryption? (Choose 2)
How are authenticated users assigned to groups so that …
Given:
ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile
on the WLAN controller for each group within the company (Marketing, Sales, and Engineering).
How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?
How can ABC Company use their existing user database fo…
Given:
ABC Company is an Internet Service Provider with thousands of customers. ABC’s customers are given login credentials for network access when they become a
customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and
would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they
implement a large-scale WPA2-Enterprise WLAN security solution?
What security best practices should be followed in this…
Given:
ABC Company is implementing a secure 802.11 WLAN at their headquarters (HQ) building in New York and at each of the 10 small, remote branch offices around
the United States. 802.1X/EAP is ABC’s preferred security solution, where possible. All access points (at the HQ building and all branch offices) connect to a single
WLAN controller located at HQ. Each branch office has only a single AP and minimal IT resources.
What security best practices should be followed in this deployment scenario?