what is the role of LDAP?
When used as part of a WLAN authentication solution, what is the role of LDAP?
Why can you not establish an RSNA?
Given:
You are using WEP as an encryption solution. You are using VLANs for network segregation.
Why can you not establish an RSNA?
What disadvantage does EAP-TLS have when compared with …
What disadvantage does EAP-TLS have when compared with PEAPv0 EAP/MSCHAPv2 as an 802.11 WLAN security solution?
What security implementation will allow the network adm…
Given:
ABC Company has 20 employees and only needs one access point to cover their entire facility. Ten of ABC Company’s employees have laptops with radio cards
capable of only WPA security. The other ten employees have laptops with radio cards capable of WPA2 security. The network administrator wishes to secure all
wireless communications (broadcast and unicast) for each laptop with its strongest supported security mechanism, but does not wish to implement a RADIUS/AAA
server due to complexity. What security implementation will allow the network administrator to achieve this goal?
What wireless security protocol provides mutual authent…
What wireless security protocol provides mutual authentication without using an X.509 certificate?
What device functions as the EAP Supplicant?
Given:
An 802.1X/EAP implementation includes an Active Directory domain controller running Windows Server 2012 and an AP from a major vendor. A Linux server is
running RADIUS and it queries the domain controller for user credentials. A Windows client is accessing the network.
What device functions as the EAP Supplicant?
what is the purpose of the 802.1X Uncontrolled Port?
In the IEEE 802.11-2012 standard, what is the purpose of the 802.1X Uncontrolled Port?
What statement accurately describes the functionality o…
What statement accurately describes the functionality of the IEEE 802.1X standard?
What solutions will require the least change in how use…
Given:
The ABC Corporation currently utilizes an enterprise Public Key Infrastructure (PKI) to allow employees to securely access network resources with smart cards. The
new wireless network will use WPA2-Enterprise as its primary authentication solution. You have been asked to recommend a Wi-Fi Alliance-tested EAP method.
What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?
what new security solution would be best for protecting…
Given:
ABC Corporation’s 802.11 WLAN is comprised of a redundant WLAN controller pair (N+1) and 30 access points implemented in 2004. ABC implemented WEP
encryption with IPSec VPN technology to secure their wireless communication because it was the strongest security solution available at the time it was
implemented. IT management has decided to upgrade the WLAN infrastructure and implement Voice over Wi-Fi and is concerned with security because most Voice
over Wi-Fi phones do not support IPSec. As the wireless network administrator, what new security solution would be best for protecting ABC’s data?