what industry requirement should you ensure you adhere?
You are implementing a wireless LAN that will be used by point-of-sale (PoS) systems in a retail environment. Thirteen PoS computers will be installed. To what
industry requirement should you ensure you adhere?
What statement indicates why Mary cannot access the net…
Given:
Mary has just finished troubleshooting an 802.11g network performance problem using a laptop-based WLAN protocol analyzer. The wireless network implements
802.1X/PEAP and the client devices are authenticating properly. When Mary disables the WLAN protocol analyzer, configures her laptop for PEAP authentication,
and then tries to connect to the wireless network, she is unsuccessful. Before using the WLAN protocol analyzer, Mary’s laptop connected to the network without
any problems. What statement indicates why Mary cannot access the network from her laptop computer?
What type of system is in view?
You work as the security administrator for your organization. In relation to the WLAN, you are viewing a dashboard that shows security threat, policy compliance and
rogue threat charts. What type of system is in view?
What security mechanism is being used on the WLAN?
Given:
A WLAN protocol analyzer trace reveals the following sequence of frames (excluding the ACK frames):
1) 802.11 Probe Req and 802.11 Probe Rsp
2) 802.11 Auth and then another 802.11 Auth
3) 802.11 Assoc Req and 802.11 Assoc Rsp
4) EAPOL-KEY
5) EAPOL-KEY
6) EAPOL-KEY
7) EAPOL-KEY
What security mechanism is being used on the WLAN?
what baseline function MUST be performed in order to id…
After completing the installation of a new overlay WIPS for the purpose of rogue detection and security monitoring at your corporate headquarters, what baseline
function MUST be performed in order to identify security threats?
What parameter is needed to physically locate rogue APs…
Given:
WLAN protocol analyzers can read and record many wireless frame parameters. What parameter is needed to physically locate rogue APs with a protocol analyzer?
what secure protocol may be used by the WNMS to issue …
When monitoring APs within a LAN using a Wireless Network Management System (WNMS), what
secure protocol may be used by the WNMS to issue configuration changes to APs?
What preventative measures are performed by a WIPS agai…
What preventative measures are performed by a WIPS against intrusions?
What field in the RSN information element (IE) will ind…
What field in the RSN information element (IE) will indicate whether PSK- or Enterprise-based WPA or WPA2 is in use?
What security vulnerabilities may result from a lack of…
What security vulnerabilities may result from a lack of staging, change management, and installation procedures for WLAN infrastructure equipment? (Choose 2)