what WLAN controller feature will likely be least valuable?
Given:
A large enterprise is designing a secure, scalable, and manageable 802.11n WLAN that will support thousands of users. The enterprise will support both 802.1X/
EAP-TTLS and PEAPv0/MSCHAPv2. Currently, the company is upgrading network servers as well and will replace their existing Microsoft IAS implementation with
Microsoft NPS, querying Active Directory for user authentication. For this organization, as they update their WLAN infrastructure, what WLAN controller feature will
likely be least valuable?
what network function?
Role-Based Access Control (RBAC) allows a WLAN administrator to perform what network function?
What RADIUS features could be used by XYZ to assign the…
Given:
XYZ Company has recently installed a controller-based WLAN and is using a RADIUS server to query authentication requests to an LDAP server. XYZ maintains
user-based access policies and would like to use the RADIUS server to facilitate network authorization. What RADIUS features could be used by XYZ to assign the
proper network permissions to users during authentication? (Choose 2)
What protocols allow a network administrator to securel…
What protocols allow a network administrator to securely manage the configuration of WLAN controllers and access points? (Choose 2)
what component is protected inside the TLS tunnel so th…
When using a tunneled EAP type, such as PEAP, what component is protected inside the TLS tunnel so that it is not sent in clear text across the wireless medium?
What device functions as the 802.1X/ EAP Authenticator?
Given:
Your network implements an 802.1X/EAP-based wireless security solution. A WLAN controller is installed and manages seven APs. FreeRADIUS is used for the
RADIUS server and is installed on a dedicated server named SRV21. One example client is a MacBook Pro with 8 GB RAM. What device functions as the 802.1X/
EAP Authenticator?
What is a possible cause of the problem?
Given:
A WLAN consultant has just finished installing a WLAN controller with 15 controller-based APs. Two SSIDs with separate VLANs are configured for this network,
and both VLANs are configured to use the same RADIUS server. The SSIDs are configured as follows:
SSID Blue – VLAN 10 – Lightweight EAP (LEAP) authentication – CCMP cipher suite SSID Red – VLAN 20 – PEAPv0/EAP-TLS authentication – TKIP cipher suite
The consultant’s computer can successfully authenticate and browse the Internet when using the Blue SSID. The same computer cannot authenticate when using
the Red SSID.
What is a possible cause of the problem?
Which one of the following statements is true related t…
Given:
Your organization is using EAP as an authentication framework with a specific type that meets the requirements of your corporate policies.
Which one of the following statements is true related to this implementation?
Which one of the following is a valid reason to avoid t…
Which one of the following is a valid reason to avoid the use of EAP-MD5 in production WLANs?
What TKIP feature was introduced to counter the weak in…
What TKIP feature was introduced to counter the weak integrity check algorithm used in WEP?