What attack type cannot be recognized by the WIPS?
ABC Company performs government contract work that requires disabling WLANs and has recently
purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their “NO WIRELESS”
network security policy.
What attack type cannot be recognized by the WIPS?
What is an advantage of using WPA2-Personal instead of …
What is an advantage of using WPA2-Personal instead of WEP-128 as a security solution for 802.11
networks?
What statement describes the authorization component of…
What statement describes the authorization component of a AAA implementation?
What terms accurately complete the following sentence?
What terms accurately complete the following sentence?
The IEEE 802.11-2012 standard specifies mandatory support of the ___________ cipher suite for Robust
Security Network Associations, and optional use of the ___________ cipher suite, which is designed for
use with pre-RSNA hardware.
which authentication methods always create Layer 2 dyna…
In WLAN security, which authentication methods always create Layer 2 dynamic encryption keys? (Choose
2)
What WLAN feature would allow the network administrator…
To ease user complexity, your company has implemented a single SSID for all employees. However, the
network administrator needs a way to control the network resources that can be accessed by each
employee based on their department.
What WLAN feature would allow the network administrator to accomplish this task?
What kind of application is described?
You are using a tool that allows you to see signal strength for all APs in the area with a visual
representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter
by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are
available. What kind of application is described?
What three cipher suites are specified by the IEEE 802….
What three cipher suites are specified by the IEEE 802.11-2012 standard? (Choose 3)
Which features are incorporated in the 802.11-2012 spec…
Which features are incorporated in the 802.11-2012 specification and are recommend for robust WLAN
client security? (Choose 2)
What device in the bridge implementation acts as the 80…
ABC Company is planning a point-to-multipoint outdoor bridge deployment with standalone
(autonomous) 802.11 bridge units. 802.1X/EAP will be used for bridge authentication. A Linux- based
RADIUS server will be used for authentication. What device in the bridge implementation acts as the
802.1X Authenticator?