What are the three roles of the 802.1X framework, as de…
What are the three roles of the 802.1X framework, as defined by the 802.1X standard, that are performed by the client STA, the AP (or WLAN controller), and the
RADIUS server? (Choose 3)
what single wireless security practice will provide the…
Given:
Fred works primarily from home and public wireless hot-spots rather than commuting to the office. He frequently accesses the office network remotely from his Mac
laptop using the local 802.11 WLAN.
In this remote scenario, what single wireless security practice will provide the greatest security for Fred?
What must you do to implement these APs in a secure man…
Given:
You are installing 6 APs on the outside of your facility. They will be mounted at a height of 6 feet. What must you do to implement these APs in a secure manner
beyond the normal indoor AP implementations? (Choose the single best answer.)
what must be changed on every AP before enabling the W…
Given:
You must implement 7 APs for a branch office location in your organization. All APs will be autonomous and provide the same two SSIDs (CORP1879 and Guest).
Because each AP is managed directly through a web-based interface, what must be changed on every
AP before enabling the WLANs to ensure proper staging procedures are followed?
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-…
What EAP type supports using MS-CHAPv2, EAP-GTC or EAP-TLS for wireless client authentication?
What client stations possess the keys that are necessar…
You have an AP implemented that functions only using 802.11-2012 standard methods for the WLAN
communications on the RF side and implementing multiple SSIDs and profiles on the management side configured as follows:
1. SSID: Guest VLAN 90 Security: Open with captive portal authentication 2 current clients
2. SSID: ABCData VLAN 10 Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP 5 current clients
3. SSID: ABCVoice VLAN 60 Security: WPA2-Personal 2 current clients Two client STAs are connected to ABCData and can access a media server that requires
authentication at the Application Layer and is used to stream multicast video streams to the clients. What client stations possess the keys that are necessary to
decrypt the multicast data packets carrying these videos?
How many unique GTKs and PTKs are currently in place in…
A single AP is configured with three separate WLAN profiles, as follows:
1. SSID: ABCData BSSID: 00:11:22:00:1F:C3 VLAN 10 Security: PEAPv0/EAP-MSCHAPv2 with AES-CCMP 3 current clients
2. SSID: ABCVoice BSSID: 00:11:22:00:1F:C4 VLAN 60 Security: WPA2-Personal with AES-CCMP 2 current clients
3. SSID: Guest BSSID: 00:11:22:00:1F:C5 VLAN 90 Security: Open with captive portal authentication 3 current clients
Three STAs are connected to ABCData. Three STAs are connected to Guest. Two STAs are connected to ABCVoice.
How many unique GTKs and PTKs are currently in place in this scenario?
What purpose does the encrypted MIC play in protecting …
Given:
When the CCMP cipher suite is used for protection of data frames, 16 bytes of overhead are added to the
Layer 2 frame. 8 of these bytes comprise the MIC.
What purpose does the encrypted MIC play in protecting the data frame?
What drawbacks initially prevented the widespread accep…
What drawbacks initially prevented the widespread acceptance and use of Opportunistic Key Caching (OKC)?
What security benefits are provided by endpoint securit…
What security benefits are provided by endpoint security solution software? (Choose 3)