What solutions will require the least change in how users are currently authenticated and still integrate with
Given: The ABC corporation currently utilizes a public key infrastructure (PKI) to allow employees to securely access network resources using smart cards. The wireless network will use WPA2- Enterprise as its primary security solution. You have been hired to recommend a Wi-Fi alliance tested EAP method
What solutions will require the least change in how users are currently authenticated and still integrate with there existing PKI?
What TKIP features prevent attacks against the known weaknesses of WEP?
What TKIP features prevent attacks against the known weaknesses of WEP? (Choose 3)
what steps must occur before a successful roam is completed?
When opportunistic key caching (OKC) is supported on the wireless network, what steps must occur before a successful roam is completed? (Choose 2)
what password related items should be addressed?
As a primary security engineer for a large corporate network you have been asked to author a new security policy for the wireless network while most clients devices support 802.11X authentication some legacy devices still passphrase.When writing the 802.11 security policy, what password related items should be addressed?
what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?
In what deployment scenarios would it be desirable to enable peer-to-peer traffic blocking?
What limitations are present with PMK caching (or PMKSA caching) when 802.1X/EAP authentication is in use?
What limitations are present with PMK caching (or PMKSA caching) when 802.1X/EAP authentication is in use?
What risks are associated with implementing the guest VLAN without any protocol filtering features enabled?
Given:Many corporations have guest VLANs configured on their WLAN controller that allow visitors to have wireless internet access only.
What risks are associated with implementing the guest VLAN without any protocol filtering features enabled? (Choose 2)
What security weakness is presented in pre-RSNA system using 802.1X with dynamic WEP?
What security weakness is presented in pre-RSNA system using 802.1X with dynamic WEP?
what wireless security policy items should be implemented?
Given:Jane Smith works primarily from home and public wireless hot spot rather than commuting to the office. She frequently accesses the office network frequently from her laptop using the 802.11 WLAN. To safeguard her data, what wireless security policy items should be implemented? (Choose 2)
How are authenticated users assigned to groups so that they receive the correct security profile within the WL
Given:ABC Company has recently installed a WLAN controller and configured it to support WPA2- Enterprise security. The administrator has confirmed a security profile on the WLAN controller for each group within the company (manufacturing, sales, and engineering)
How are authenticated users assigned to groups so that they receive the correct security profile within the WLAN controller?