what protocol must RADIUS support?
Given: In order to implement a WPA2-Enterprise security solution, what protocol must RADIUS support?
When initializing in standalone mode, a Wi-Fi Protected Setup (WPS) AP should:
When initializing in standalone mode, a Wi-Fi Protected Setup (WPS) AP should:
Why does the IEEE 802.11 standard implement this algorithm?
Given: A passphrase-to-PSK mapping algorithm is recommended for use with Robust Security Network Associations (RSNAs).
Why does the IEEE 802.11 standard implement this algorithm?
What IPSec protocol is required when the header and data payload must be encrypted?
Given: ABC Corporation has decided to use IPSec VPN technology to secure their wireless connections. To prevent eavesdropping attacks, strong encryption is a key factor in the security solution.
What IPSec protocol is required when the header and data payload must be encrypted?
What security implementation will allow the network administrator to achieve his goal?
Given: ABC Company has four employees and only needs one access point to cover their entire facility. Two of ABC Company’s employees have laptops with radio cards capable of only WPA-Personal security. The other two employees have laptops with radio cards capable of WPA-Personal and WPA2-Personal security. The network administrator wishes to secure each laptop with its strongest supported security mechanism.
What security implementation will allow the network administrator to achieve his goal?
what is the role of LDAP?
When used as part of a WLAN authentication solution, what is the role of LDAP?
What statements regarding this migration are true?
Given: ABC Corporation is migrating from WPA-Personal to WPA2-Enterprise for the added security and scalability benefits. The migration is occurring gradually so the fewest number of users are disrupted simultaneously.
What statements regarding this migration are true?
What WLAN security solution is appropriate?
Given: ABC Corporation sends extremely sensitive data files and email across the wireless network daily. To prevent eavesdropping attacks, the company has decided that unbreakable standards-based authentication and data encryption are needed on their new 802.11 WLAN. ABC has documented this requirement in their corporate security policy. You have been hired to implement a wireless security solution that meets their policy requirements. ABC has 20 access points and 200 users.
What WLAN security solution is appropriate?
What solutions will require the least change in how users are currently authenticated and still integrate with
Given: The ABC Corporation currently utilizes a Public Key Infrastructure (PKI) to allow employees to securely access network resources using smart cards. The new wireless network will use WPA2-Enterprise as its primary security solution. You have been hired to recommend a Wi-Fi Alliance-approved EAP method.
What solutions will require the least change in how users are currently authenticated and still integrate with their existing PKI?
What wireless security protocols provide mutual authentication without using x.509 certificates?
What wireless security protocols provide mutual authentication without using x.509 certificates?