PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

What option specifies the best approach to minimize leg…

Given:
You support a coffee shop and have recently installed a free 802.11ac wireless hot-spot for the benefit of your customers. You want to minimize legal risk in the
event that the hot-spot is used for illegal Internet activity.
What option specifies the best approach to minimize legal risk at this public hot-spot while maintaining an open venue for customer Internet access?

Where must the X.509 server certificate and private key…

Given:
Your company has just completed installation of an IEEE 802.11 WLAN controller with 20

controller-based APs. The CSO has specified PEAPv0/EAP-MSCHAPv2 as the only authorized WLAN authentication mechanism. Since an LDAP-compliant user

database was already in use, a RADIUS server was installed and is querying authentication requests to the LDAP server. Where must the X.509 server certificate
and private key be installed in this network?

What security controls would you suggest?

Given:
ABC Company has a WLAN controller using WPA2-Enterprise with PEAPv0/MS-CHAPv2 and AES-CCMP to secure their corporate wireless data. They wish to
implement a guest WLAN for guest users to have Internet access, but want to implement some security controls. The security requirements for the hot-spot include:

-Cannot access corporate network resources
-Network permissions are limited to Internet access
-All stations must be authenticated

What security controls would you suggest? (Choose the single best answer.)

How are authenticated users assigned to groups so that …

Given:
ABC Company has recently installed a WLAN controller and configured it to support WPA2-Enterprise security. The administrator has configured a security profile
on the WLAN controller for each group within the company (Marketing, Sales, and Engineering).
How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?

How can ABC Company use their existing user database fo…

Given:
ABC Company is an Internet Service Provider with thousands of customers. ABC’s customers are given login credentials for network access when they become a
customer. ABC uses an LDAP server as the central user credential database. ABC is extending their service to existing customers in some public access areas and
would like to use their existing database for authentication. How can ABC Company use their existing user database for wireless user authentication as they
implement a large-scale WPA2-Enterprise WLAN security solution?

What security best practices should be followed in this…

Given:
ABC Company is implementing a secure 802.11 WLAN at their headquarters (HQ) building in New York and at each of the 10 small, remote branch offices around
the United States. 802.1X/EAP is ABC’s preferred security solution, where possible. All access points (at the HQ building and all branch offices) connect to a single
WLAN controller located at HQ. Each branch office has only a single AP and minimal IT resources.
What security best practices should be followed in this deployment scenario?


Page 23 of 87« First...10...2122232425...304050...Last »