What protocols allow an administrator to securely transfer a new operating system image to a WLAN controller?
What protocols allow an administrator to securely transfer a new operating system image to a WLAN controller?
What type of attack is prevented when TKIP uses an 8 octet message integrity check (MIC)?
What type of attack is prevented when TKIP uses an 8 octet message integrity check (MIC)?
what WLAN security policy measures should be followed?
Given: The size of your IEEE 802.11 WLAN is growing rapidly.
To maintain consistent network security, what WLAN security policy measures should be followed?
What are the appropriate sections for a WLAN security policy?
Given: A strong security policy is the first step in securing an IEEE 802.11 WLAN.
What are the appropriate sections for a WLAN security policy?
what is protected against clear text transmission across the wireless medium?
When using a tunneled EAP type, what is protected against clear text transmission across the wireless medium?
what must be done as part of the WIPS installation?
For WIPS to describe the location of a rogue WLAN device, what must be done as part of the WIPS installation?
what criteria?
RFC 3748 specifies that the EAP-response/identity frame must comply with what criteria?
what types of WLAN attacks?
Given: John Smith often telecommutes from a coffee shop near his home.
The coffee shop has an ERP access point with a captive portal for authentication.
At this hotspot, John’s Wi-Fi enabled computer is susceptible to what types of WLAN attacks?
what password-related items should be included in a security policy?
When implementing an IEEE 802.11 WLAN, what password-related items should be included in a security policy?
What security protocols support using either MS-CHAPv2 or EAP-TLS for wireless client authentication?
What security protocols support using either MS-CHAPv2 or EAP-TLS for wireless client authentication?