what is rule of LDAP?
When used as portal of WLAN authentication solution, what is rule of LDAP?
what new security solution would be best for protecting ABC’s data?
Given:ABC Corporation’s 802.11 WLAN is comprised of a redundant WLAN controller paid and 30-access points. ABC implemented WEP encryption with IPSec VPN technology to secure there wireless communication because it was the strongest security solution available at the time it was implemented. IT management has had decided to upgrade the WLAN infrastructure and implement VoWiFi and is connected with security because most VoWiFi phones do no support IPSec.
As the wireless network administrator, what new security solution would be best for protecting ABC’s data?
what do you tell ABC Corporation about implementing MS-CHAPv2 authentication?
Given: ABC corporation is selecting a security solution for there new WLAN. Two of there considered solutions PPTP VPN and 802.1XEAP. They have considered a PPTP VPN and because it is included with both server and desktop operating system. With both solutions are considered strong enough to adhere to corporate security police, the company is worried about security weakness of MS-CHAPv2 authentication.
As a consultant what do you tell ABC Corporation about implementing MS-CHAPv2 authentication? (Choose 2)
how should a wireless security professional address to problem of rogue access points?
As part of large organization’s security policy how should a wireless security professional address to problem of rogue access points?
What parameter is needed to physically locate rogue APs with a protocol analyzer?
Given:WLAN protocol analyzers can read and reject many wireless frame parameters.
What parameter is needed to physically locate rogue APs with a protocol analyzer?
what is protected from clear text across the wireless medium?
When using a tunneled EAP type, what is protected from clear text across the wireless medium?
when is 802.1X controlled port placed into the unblocked state?
In An IEEE 802.11-complaint WLAN, when is 802.1X controlled port placed into the unblocked state?
What impact may 802.11w have on the efforts of rogue device containment with an overlay WIPS?
What impact may 802.11w have on the efforts of rogue device containment with an overlay WIPS?
What are the appropriate sections of a WLAN security policy?
Given: ABC hospital wishes to create a strong security policy as a first step in securing there 802.11 WLAN
What are the appropriate sections of a WLAN security policy? (Choose 3)
What penetative measures are performed by a WIPS against intrusions?
What penetative measures are performed by a WIPS against intrusions?