What wireless authentication technologies may build a T…
What wireless authentication technologies may build a TLS tunnel between the supplicant and the authentication server before passing client authentication
credentials to the authentication server? (Choose 3)
What is one advantage of using EAP-TTLS instead of EAP-…
What is one advantage of using EAP-TTLS instead of EAP-TLS as an authentication mechanism in an 802.11 WLAN?
What policy would help mitigate the impact of peer-to-p…
What policy would help mitigate the impact of peer-to-peer attacks against wireless-enabled corporate laptop computers when the laptops are also used on public
access networks such as wireless hot-spots?
what should you ensure you possess?
Given:
ABC Hospital wishes to create a strong security policy as a first step in securing their 802.11 WLAN. Before creating the WLAN security policy, what should you
ensure you possess?
what password-related items should be addressed?
As the primary security engineer for a large corporate network, you have been asked to author a new security policy for the wireless network. While most client
devices support 802.1X authentication, some legacy devices still only support passphrase/PSK-based security methods. When writing the 802.11 security policy,
what password-related items should be addressed?
what deployment scenarios would it be desirable to enab…
In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?
how should a wireless security professional address the…
As a part of a large organization’s security policy, how should a wireless security professional address the problem of rogue access points?
What elements should be addressed by a WLAN security policy?
What elements should be addressed by a WLAN security policy? (Choose 2)
how can the consultant cause all of the authorized clie…
Given:
In a security penetration exercise, a WLAN consultant obtains the WEP key of XYZ Corporation’s wireless network. Demonstrating the vulnerabilities of using WEP,
the consultant uses a laptop running a software AP in an attempt to hijack the authorized user’s connections. XYZ’s legacy network is using 802.11n APs with
802.11b, 11g, and 11n client devices.
With this setup, how can the consultant cause all of the authorized clients to establish Layer 2 connectivity with the software access point?
What security solution is represented?
You perform a protocol capture using Wireshark and a compatible 802.11 adapter in Linux. When viewing the capture, you see an auth req frame and an auth rsp
frame. Then you see an assoc req frame and an assoc rsp frame. Shortly after, you see DHCP communications and then ISAKMP protocol packets. What
security solution is represented?