Which of the following are the most likely threats to his computer?
Victor wants to use Wireless Zero Configuration (WZC) to establish a wireless network connection using his computer running on Windows XP operating system. Which of the following are the most likely threats to his computer?
Each correct answer represents a complete solution. Choose two.
Which of the following EAP protocols carries a text challenge from the authentication server and provides serv
Which of the following EAP protocols carries a text challenge from the authentication server and provides server authentication in a wireless network?
_________________ is the process of verifying an individual identity, which is usually based on username and p
Fill in the blank with the appropriate term.
_________________ is the process of verifying an individual identity, which is usually based on username and password.
Which of the following Extensible Authentication protocols uses a SIM authentication algorithm…?
Which of the following Extensible Authentication protocols uses a SIM authentication algorithm between the client and AAA server for providing mutual authentication between the client and the network?
Which of the following encryption methods use the RC4 technology?
Which of the following encryption methods use the RC4 technology? Each correct answer represents a complete solution. Choose all that apply.
What services can NetStumbler provide?
You work as a Network Administrator for Tech Perfect Inc. The company has a secure wireless network. Since the company’s wireless network is so dynamic, it requires regular auditing to maintain proper security. For this reason, you are configuring NetStumbler as a wireless auditing tool. What services can NetStumbler provide? Each correct answer represents a complete solution.
Choose all that apply.
Which of the following types of attacks come under the category of hacker attacks?
Which of the following types of attacks come under the category of hacker attacks? Each correct answer represents a complete solution. Choose all that apply.
11 devices
Fill in the blank with the appropriate term.
_______________ authentication is the default authentication method used by 802.11 devices.
Which of the following types of attacks cannot be prevented by a firewall?
Which of the following types of attacks cannot be prevented by a firewall? Each correct answer represents a complete solution. Choose all that apply.
Which of the following actions will you perform to accomplish the task?
You work as a Network Administrator for Tech Perfect Inc. The company has a Windows Server 2008 network environment. The network is configured as a Windows Active Directory-based single forest domain-based network. The company has recently provided fifty laptops to its sales team members. You are required to configure an 802.11 wireless network for the laptops. The sales team members must be able to use their data placed at a server in a cabled network. The planned network should be able to handle the threat of unauthorized access and data interception by an unauthorized user. You are also required to prevent the sales team members from communicating directly to one another. Which of the following actions will you perform to accomplish the task? Each correct answer represents a complete solution. Choose all that apply.