What specific topics are appropriate in this policy meeting?
Users and Network support personnel at a mid-sized equipment manufacturer have been discussing the
potential uses and benefits of implementing an indoor WLAN. The network administrator and network
manager have requested a meeting of senior management personnel to discuss a WLAN implementation
before performing a site survey or taking any implementation steps. The first topic of discussion in the
meeting is the corporate policy concerning implementation and use of WLAN technology.
What specific topics are appropriate in this policy meeting? (Choose 2)
What attack type cannot be recognized by the WIPS?
ABC Company performs government contract work that requires disabling WLANs and has recently
purchased an 802.11 Wireless Intrusion Prevention System (WIPS) to enforce their “NO WIRELESS”
network security policy.
What attack type cannot be recognized by the WIPS?
What is an advantage of using WPA2-Personal instead of …
What is an advantage of using WPA2-Personal instead of WEP-128 as a security solution for 802.11
networks?
What statement describes the authorization component of…
What statement describes the authorization component of a AAA implementation?
What terms accurately complete the following sentence?
What terms accurately complete the following sentence?
The IEEE 802.11-2012 standard specifies mandatory support of the ___________ cipher suite for Robust
Security Network Associations, and optional use of the ___________ cipher suite, which is designed for
use with pre-RSNA hardware.
which authentication methods always create Layer 2 dyna…
In WLAN security, which authentication methods always create Layer 2 dynamic encryption keys? (Choose
2)
What WLAN feature would allow the network administrator…
To ease user complexity, your company has implemented a single SSID for all employees. However, the
network administrator needs a way to control the network resources that can be accessed by each
employee based on their department.
What WLAN feature would allow the network administrator to accomplish this task?
What kind of application is described?
You are using a tool that allows you to see signal strength for all APs in the area with a visual
representation. It shows you SSIDs available and the security settings for each SSID. It allows you to filter
by frequency band to see only 2.4 GHz networks or only 5 GHz networks. No additional features are
available. What kind of application is described?
What three cipher suites are specified by the IEEE 802….
What three cipher suites are specified by the IEEE 802.11-2012 standard? (Choose 3)
Which features are incorporated in the 802.11-2012 spec…
Which features are incorporated in the 802.11-2012 specification and are recommend for robust WLAN
client security? (Choose 2)